{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T09:20:31Z","timestamp":1719220831258},"reference-count":53,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Engineering Applications of Artificial Intelligence"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1016\/j.engappai.2024.108427","type":"journal-article","created":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T17:16:28Z","timestamp":1714410988000},"page":"108427","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"title":["An enhanced algorithm for object detection based on generative adversarial structure"],"prefix":"10.1016","volume":"133","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-6757-6838","authenticated-orcid":false,"given":"Yun","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3128-3475","authenticated-orcid":false,"given":"Cheng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Yuyao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shujuan","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Liya","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Na","family":"Xie","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.engappai.2024.108427_bib1","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"8296","article-title":"Image2stylegan++: how to edit the embedded images?","author":"Abdal","year":"2020"},{"key":"10.1016\/j.engappai.2024.108427_bib2","first-page":"17","article-title":"Towards principled methods for training generative adversarial networks","volume":"1050","author":"Arjovsky","year":"2017","journal-title":"Stat"},{"key":"10.1016\/j.engappai.2024.108427_bib3","series-title":"International Conference on Machine Learning","first-page":"214","article-title":"Wasserstein generative adversarial networks","author":"Arjovsky","year":"2017"},{"key":"10.1016\/j.engappai.2024.108427_bib4","series-title":"Proceedings of the European Conference on Computer Vision (ECCV)","first-page":"206","article-title":"Sod-mtgan: small object detection via multi-task generative adversarial network","author":"Bai","year":"2018"},{"key":"10.1016\/j.engappai.2024.108427_bib5","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"2874","article-title":"Inside-outside net: detecting objects in context with skip pooling and recurrent neural networks","author":"Bell","year":"2016"},{"key":"10.1016\/j.engappai.2024.108427_bib6","unstructured":"Bochkovskiy, A., Wang, C.-Y., & Liao, H.-Y. M. (n.d.). YOLOv4: Optimal Speed and Accuracy of Object Detection."},{"key":"10.1016\/j.engappai.2024.108427_bib7","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2022.108998","article-title":"A full data augmentation pipeline for small object detection based on generative adversarial networks","volume":"133","author":"Bosquet","year":"2023","journal-title":"Pattern Recogn."},{"issue":"2","key":"10.1016\/j.engappai.2024.108427_bib8","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1111\/j.2517-6161.1964.tb00553.x","article-title":"An analysis of transformations","volume":"26","author":"Box","year":"1964","journal-title":"J. Roy. Stat. Soc. B Stat. Methodol."},{"key":"10.1016\/j.engappai.2024.108427_bib9","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"6154","article-title":"Cascade r-cnn: delving into high quality object detection","author":"Cai","year":"2018"},{"key":"10.1016\/j.engappai.2024.108427_bib10","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"13039","article-title":"You only look one-level feature","author":"Chen","year":"2021"},{"key":"10.1016\/j.engappai.2024.108427_bib11","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"6144","article-title":"Segan: segmenting and generating the invisible","author":"Ehsani","year":"2018"},{"key":"10.1016\/j.engappai.2024.108427_bib53","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/s11263-009-0275-4","article-title":"The pascal visual object classes (voc) challenge","volume":"88","author":"Everingham","year":"2010","journal-title":"International journal of computer vision"},{"issue":"200","key":"10.1016\/j.engappai.2024.108427_bib12","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1080\/01621459.1937.10503522","article-title":"The use of ranks to avoid the assumption of normality implicit in the analysis of variance","volume":"32","author":"Friedman","year":"1937","journal-title":"J. Am. Stat. Assoc."},{"key":"10.1016\/j.engappai.2024.108427_bib13","article-title":"Generative adversarial nets","volume":"27","author":"Goodfellow","year":"2014","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"2","key":"10.1016\/j.engappai.2024.108427_bib14","article-title":"A region-based efficient network for accurate object detection","volume":"38","author":"Guan","year":"2021","journal-title":"Trait. Du. Signal"},{"issue":"3","key":"10.1016\/j.engappai.2024.108427_bib15","article-title":"An object detection framework based on deep features and high-quality object locations","volume":"38","author":"Guan","year":"2021","journal-title":"Trait. Du. Signal"},{"key":"10.1016\/j.engappai.2024.108427_bib16","article-title":"Improved training of wasserstein gans","volume":"30","author":"Gulrajani","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.engappai.2024.108427_bib17","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"447","article-title":"Hypercolumns for object segmentation and fine-grained localization","author":"Hariharan","year":"2015"},{"key":"10.1016\/j.engappai.2024.108427_bib18","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"770","article-title":"Deep residual learning for image recognition","author":"He","year":"2016"},{"key":"10.1016\/j.engappai.2024.108427_bib19","series-title":"Computer Vision\u2013ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11\u201314, 2016, Proceedings, Part IV 14","first-page":"630","article-title":"Identity mappings in deep residual networks","author":"He","year":"2016"},{"key":"10.1016\/j.engappai.2024.108427_bib20","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"4507","article-title":"Learning non-maximum suppression","author":"Hosang","year":"2017"},{"key":"10.1016\/j.engappai.2024.108427_bib21","first-page":"852","article-title":"Alias-free generative adversarial networks","volume":"34","author":"Karras","year":"2021","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.engappai.2024.108427_bib22","series-title":"International Conference on Learning Representations (ICLR) Workshop","article-title":"Adam: a method for stochastic optimization","author":"Kingma","year":"2014"},{"key":"10.1016\/j.engappai.2024.108427_bib23","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"845","article-title":"Hypernet: towards accurate region proposal generation and joint object detection","author":"Kong","year":"2016"},{"key":"10.1016\/j.engappai.2024.108427_bib24","series-title":"Proceedings of the European Conference on Computer Vision (ECCV)","first-page":"734","article-title":"Cornernet: detecting objects as paired keypoints","author":"Law","year":"2018"},{"issue":"7553","key":"10.1016\/j.engappai.2024.108427_bib25","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"LeCun","year":"2015","journal-title":"Nature"},{"key":"10.1016\/j.engappai.2024.108427_bib26","article-title":"Triple generative adversarial nets","volume":"30","author":"Li","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.engappai.2024.108427_bib27","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"1222","article-title":"Perceptual generative adversarial networks for small object detection","author":"Li","year":"2017"},{"key":"10.1016\/j.engappai.2024.108427_bib28","doi-asserted-by":"crossref","first-page":"6893","DOI":"10.1109\/TIP.2022.3216771","article-title":"Cbnet: a composite backbone network architecture for object detection","volume":"31","author":"Liang","year":"2022","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.engappai.2024.108427_bib29","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"2117","article-title":"Feature pyramid networks for object detection","author":"Lin","year":"2017"},{"key":"10.1016\/j.engappai.2024.108427_bib52","series-title":"Proceedings of Computer Vision\u2013ECCV 2014: 13th European Conference","first-page":"740","article-title":"Microsoft coco: Common objects in context","author":"Lin","year":"2014"},{"key":"10.1016\/j.engappai.2024.108427_bib30","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"10012","article-title":"Swin transformer: hierarchical vision transformer using shifted windows","author":"Liu","year":"2021"},{"key":"10.1016\/j.engappai.2024.108427_bib31","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"3431","article-title":"Fully convolutional networks for semantic segmentation","author":"Long","year":"2015"},{"key":"10.1016\/j.engappai.2024.108427_bib32","series-title":"Computer Vision\u2013ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11-14, 2016, Proceedings, Part VIII 14","first-page":"483","article-title":"Stacked hourglass networks for human pose estimation","author":"Newell","year":"2016"},{"key":"10.1016\/j.engappai.2024.108427_bib33","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1016\/j.neucom.2021.06.094","article-title":"Generative adversarial network with object detector discriminator for enhanced defect detection on ultrasonic B-scans","volume":"459","author":"Posilovi\u0107","year":"2021","journal-title":"Neurocomputing"},{"key":"10.1016\/j.engappai.2024.108427_bib34","doi-asserted-by":"crossref","first-page":"9220","DOI":"10.1109\/TIP.2021.3124155","article-title":"It GAN DO better: GAN-based detection of objects on images with varying quality","volume":"30","author":"Prakash","year":"2021","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.engappai.2024.108427_bib35","series-title":"Unsupervised representation learning with deep convolutional generative adversarial networks","author":"Radford","year":"2015"},{"key":"10.1016\/j.engappai.2024.108427_bib36","article-title":"Faster r-cnn: towards real-time object detection with region proposal networks","volume":"28","author":"Ren","year":"2015","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"1","key":"10.1016\/j.engappai.2024.108427_bib37","doi-asserted-by":"crossref","DOI":"10.1088\/1742-6596\/1827\/1\/012178","article-title":"Improved object detection using data enhancement method based on generative adversarial nets","volume":"1827","author":"Ruiqiang","year":"2021","journal-title":"J. Phys. Conf."},{"key":"10.1016\/j.engappai.2024.108427_bib38","article-title":"Improved techniques for training gans","volume":"29","author":"Salimans","year":"2016","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.engappai.2024.108427_bib39","article-title":"Weight normalization: a simple reparameterization to accelerate training of deep neural networks","volume":"29","author":"Salimans","year":"2016","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.engappai.2024.108427_bib40","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"9243","article-title":"Interpreting the latent space of gans for semantic face editing","author":"Shen","year":"2020"},{"issue":"24","key":"10.1016\/j.engappai.2024.108427_bib41","doi-asserted-by":"crossref","first-page":"4734","DOI":"10.3390\/math10244734","article-title":"Random maximum 2 satisfiability logic in discrete hopfield neural network incorporating improved election Algorithm","volume":"10","author":"Someetheram","year":"2022","journal-title":"Mathematics"},{"key":"10.1016\/j.engappai.2024.108427_bib42","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1016\/j.neucom.2022.07.081","article-title":"Moving objects segmentation using generative adversarial modeling","volume":"506","author":"Sultana","year":"2022","journal-title":"Neurocomputing"},{"key":"10.1016\/j.engappai.2024.108427_bib43","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"9627","article-title":"Fcos: fully convolutional one-stage object detection","author":"Tian","year":"2019"},{"key":"10.1016\/j.engappai.2024.108427_bib44","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"851","article-title":"End-to-end integration of a convolution network, deformable parts model and non-maximum suppression","author":"Wan","year":"2015"},{"key":"10.1016\/j.engappai.2024.108427_bib45","series-title":"Proceedings of the ACM Workshop on Information Hiding and Multimedia Security","first-page":"113","article-title":"Exposing GAN-synthesized faces using landmark locations","author":"Yang","year":"2019"},{"key":"10.1016\/j.engappai.2024.108427_bib46","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"2403","article-title":"Deep layer aggregation","author":"Yu","year":"2018"},{"key":"10.1016\/j.engappai.2024.108427_bib47","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2022.109312","article-title":"Weighted random k satisfiability for k= 1, 2 (r2SAT) in discrete Hopfield neural network","volume":"126","author":"Zamri","year":"2022","journal-title":"Appl. Soft Comput."},{"issue":"9","key":"10.1016\/j.engappai.2024.108427_bib48","doi-asserted-by":"crossref","first-page":"4609","DOI":"10.3390\/app12094609","article-title":"ODEM-GAN: an object deformation enhancement model based on generative adversarial networks","volume":"12","author":"Zhang","year":"2022","journal-title":"Appl. Sci."},{"key":"10.1016\/j.engappai.2024.108427_bib49","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"2881","article-title":"Pyramid scene parsing network","author":"Zhao","year":"2017"},{"key":"10.1016\/j.engappai.2024.108427_bib50","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"14061","article-title":"Omni-gan: on the secrets of cgans and beyond","author":"Zhou","year":"2021"},{"key":"10.1016\/j.engappai.2024.108427_bib51","series-title":"Objects as Points","author":"Zhou","year":"2019"}],"container-title":["Engineering Applications of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197624005852?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197624005852?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,6,8]],"date-time":"2024-06-08T01:32:40Z","timestamp":1717810360000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0952197624005852"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":53,"alternative-id":["S0952197624005852"],"URL":"https:\/\/doi.org\/10.1016\/j.engappai.2024.108427","relation":{},"ISSN":["0952-1976"],"issn-type":[{"value":"0952-1976","type":"print"}],"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"An enhanced algorithm for object detection based on generative adversarial structure","name":"articletitle","label":"Article Title"},{"value":"Engineering Applications of Artificial Intelligence","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.engappai.2024.108427","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"108427"}}