{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:44:39Z","timestamp":1743111879307,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030791995"},{"type":"electronic","value":"9783030792008"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-79200-8_22","type":"book-chapter","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:04:06Z","timestamp":1624471446000},"page":"158-165","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Face Detection of Innovation Base Based on Faster RCNN"],"prefix":"10.1007","author":[{"given":"Haixing","family":"Guan","sequence":"first","affiliation":[]},{"given":"Hongliang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Rongqiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Mingyang","family":"Qi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,24]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Redmon, J., Divvala, S., Girshick R., et al.: You only look once: unified, real-time object detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 779\u2013788 (2016)","DOI":"10.1109\/CVPR.2016.91"},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-46448-0_2","volume-title":"Computer Vision \u2013 ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11\u201314, 2016, Proceedings, Part I","author":"W Liu","year":"2016","unstructured":"Liu, W., et al.: SSD: single shot multibox detector. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) Computer Vision \u2013 ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11\u201314, 2016, Proceedings, Part I, pp. 21\u201337. Springer International Publishing, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46448-0_2"},{"key":"22_CR3","unstructured":"Ren, S., He, K., Girshick, R., Sun, J.: Faster R-CNN: towards real-time object detection with region proposal networks. In: Advances in Neural Information Processing Systems, pp. 91\u201399 (2015)"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Girshick, R., Donahue J., Darrell, T., Malik, J.: Rich feature hierarchies for accurate object detection and semantic segmentation. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 580\u2013587 (2014)","DOI":"10.1109\/CVPR.2014.81"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Chen, D., Hua, G., Wen, F., et al.: Supervised transformer network for efficient face detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 122\u2013138 (2016)","DOI":"10.1007\/978-3-319-46454-1_8"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Le, T.H.N., Zhang, Y., Zhu, C., et al.: Multiple scale faster-RCNN approach to driver\u2019s cell-phone usage and hands on steering wheel detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Workshops, pp. 46\u201353 (2016)","DOI":"10.1109\/CVPRW.2016.13"},{"key":"22_CR7","unstructured":"Dai, H., Mao, Y.: An improved face detection algorithm based on R-FCN model. Comput. Modern. 276(8), 16\u201319+24 (2018)"},{"key":"22_CR8","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: ICLR (2014)"},{"issue":"2","key":"22_CR9","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/s42979-020-0114-9","volume":"1","author":"D Theckedath","year":"2020","unstructured":"Theckedath, D., Sedamkar, R.R.: Detecting affect states using VGG16, ResNet50 and SE-ResNet50 networks. SN Comput. Sci. 1(2), 18\u201337 (2020). https:\/\/doi.org\/10.1007\/s42979-020-0114-9","journal-title":"SN Comput. Sci."},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":". Uijlings, J.R.R., Sande, K.E.A., Gevers, T., Smeulders, A.W.M.: Selective search for object recognition. Int. J. Comput. Vis. (2) (2013)","DOI":"10.1007\/s11263-013-0620-5"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Langer, S.: Approximating smooth functions by deep neural networks with sigmoid activation function. J. Multivariate Anal. (2020, prepublish)","DOI":"10.1016\/j.jmva.2020.104696"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Liang, X., Xu, J.: Biased ReLU neural networks. 423, 71\u201379 (2021)","DOI":"10.1016\/j.neucom.2020.09.050"}],"container-title":["Advances in Intelligent Systems and Computing","2021 International Conference on Applications and Techniques in Cyber Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-79200-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:25:03Z","timestamp":1624472703000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-79200-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030791995","9783030792008"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-79200-8_22","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"24 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ATCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications and Techniques in Cyber Security and Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Fuyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"atci2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/atci2021.fynu.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}