{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:19:48Z","timestamp":1742912388934,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031067877"},{"type":"electronic","value":"9783031067884"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-06788-4_5","type":"book-chapter","created":{"date-parts":[[2022,7,3]],"date-time":"2022-07-03T23:03:27Z","timestamp":1656889407000},"page":"51-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Anomaly Detection Model for Key Places Based on Improved YOLOv5"],"prefix":"10.1007","author":[{"given":"Wang","family":"Yuanxin","sequence":"first","affiliation":[]},{"given":"Yuan","family":"Deyu","sequence":"additional","affiliation":[]},{"given":"Yuyan","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Ding","family":"Meng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,4]]},"reference":[{"key":"5_CR1","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classfication with deep convolutional neural networks. Advances in neural information processing systems, 25, 1097\u20131105 (2012)"},{"key":"5_CR2","unstructured":"Nair, V., Hinton, G.E.: Rectifified linear units improver-estricted boltzmann machines. International Conference on Machine Learning, pp. 807\u2013814 (2010)"},{"key":"5_CR3","unstructured":"Hinton, G.E., Srivastava, N., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.R.: Improving neural networksby preventing coadaptation of feature detectors. arXiv preprint arXiv. (2012)"},{"issue":"7","key":"5_CR4","first-page":"92","volume":"36","author":"Z Ting-Ting","year":"2020","unstructured":"Ting-Ting, Z., Jian-Wu, Z., Chun-Sheng, G., et al.: A review of deep learning-based image target detection algorithms. Telecommun. Sci. 36(7), 92\u2013106 (2020)","journal-title":"Telecommun. Sci."},{"issue":"6","key":"5_CR5","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/TPAMI.2016.2577031","volume":"39","author":"SQ Ren","year":"2017","unstructured":"Ren, S.Q., He, K.M., Girshickr, R., et al.: Faster R-CNN: towards real-time object detection with region proposal networks. IEEE Trans. Pattern Anal. Mach. Intell. 39(6), 1137\u20131149 (2017)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"5_CR6","unstructured":"Li, Z., Peng, C., Yu, G., et al.: Light-Head R-CNN: in Defense of Twostage Object Detector. [2017\u201311\u201322]. https:\/\/arxiv.org\/pdf\/1711.07264.pdf"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Cai, Z., Vasconcelos, N.: Cascade R-CNN: delving into high quality object detection. In: Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition. pp. 6154\u20136162. IEEE, Piscataway (2018)","DOI":"10.1109\/CVPR.2018.00644"},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-46448-0_2","volume-title":"Computer Vision \u2013 ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11\u201314, 2016, Proceedings, Part I","author":"W Liu","year":"2016","unstructured":"Liu, W., Anguelov, D., Erhan, D., Szegedy, C., Reed, S., Cheng-Yang, F., Berg, A.C.: SSD: Single Shot MultiBox Detector. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) Computer Vision \u2013 ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11\u201314, 2016, Proceedings, Part I, pp. 21\u201337. Springer International Publishing, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46448-0_2"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You onlylookonce: Unified, realtime object detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. pp. 779\u2013788 (2016)","DOI":"10.1109\/CVPR.2016.91"},{"key":"5_CR10","unstructured":"Fu, C.Y., Liu, W., Ranga, A., et al.: Dssd: deconvolutional single shot detector [EB\/OL]. [2017\u201301\u201323] . https:\/\/arxiv.org\/pdf\/1701.06659.pdf"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Lin, T.-Y., Doll\u00b4ar, P., Girshick, R.B., He, K., Hariharan, B., Belongie, S.J.: Feature Pyramid Networks for Object Detection. In: CVPR, vol. 1, no. 2, p. 4 (2017)","DOI":"10.1109\/CVPR.2017.106"},{"issue":"5","key":"5_CR12","first-page":"174","volume":"178","author":"D Wu","year":"2020","unstructured":"Wu, D., Lv, S., Jiang, M., et al.: Using channel pruning-based YOLO v4 deep learning algorithm for the real-time and accurate detection f apple flowers in natural environments. Comput. Electron. Agric. 178(5), 174\u2013178 (2020)","journal-title":"Comput. Electron. Agric."},{"issue":"02","key":"5_CR13","first-page":"147","volume":"42","author":"SL Tan","year":"2021","unstructured":"Tan, S.L., Bei, X., Lu, G., Tan, X.: Real-time detection of personnel mask wear based on YOLOv5 network model. Laser Journal 42(02), 147\u2013150 (2021)","journal-title":"Laser Journal"},{"issue":"20","key":"5_CR14","first-page":"236","volume":"57","author":"Y Juan","year":"2021","unstructured":"Juan, Y., Shun, L.: A YOLOv5-based method for unauthorized building detection. Comput. Eng. Appl. 57(20), 236\u2013244 (2021)","journal-title":"Comput. Eng. Appl."},{"key":"5_CR15","doi-asserted-by":"publisher","unstructured":"Gao, M.H., Yang, C.: A traffic target detection method based on improved convolutional neural network. Journal of Jilin University (Engineering Edition). 1\u20139 [2021\u201311\u201308]. https:\/\/doi.org\/10.13229\/j.cnki.jdxbgxb20210380","DOI":"10.13229\/j.cnki.jdxbgxb20210380"},{"key":"5_CR16","unstructured":"Zheng, Z., Wang, P., Liu, W., et al.: Distance-IoU Loss: Faster and Better Learning for Bounding Box Regression. arXiv, 1911.08287 (2019)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Zhao, W., Qu, H.: Application of improved algorithm based on sphere OBB hybrid hierarchical bounding box in teaching. In: Journal of Physics: Conference Series, 1732(1), 012080 (2021)","DOI":"10.1088\/1742-6596\/1732\/1\/012080"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-030-58558-7_12","volume-title":"Computer Vision \u2013 ECCV 2020","author":"Z Chen","year":"2020","unstructured":"Chen, Z., et al.: PIoU loss: towards accurate oriented object detection in complex environments. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12350, pp. 195\u2013211. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58558-7_12"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., Dollar, P., Girshick, R., et al.: Feature pyramid networks for object detection. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE Computer Society (2017)","DOI":"10.1109\/CVPR.2017.106"},{"key":"5_CR20","doi-asserted-by":"publisher","unstructured":"Zhang, W.-L., Nan, X.-Y.: A road vehicle tracking algorithm based on improved YOLOv5. Journal of Guangxi Normal University (Natural Science Edition):1\u20138 [2021\u201311\u201308]. https:\/\/doi.org\/10.16088\/j.issn.1001-6600.2021081303","DOI":"10.16088\/j.issn.1001-6600.2021081303"},{"issue":"01","key":"5_CR21","first-page":"1","volume":"31","author":"H Lu","year":"2016","unstructured":"Lu, H., Zhang, Q.: A review of research on the application of deep convolutional neural networks in computer vision. Data Acquisition Process. 31(01), 1\u201317 (2016)","journal-title":"Data Acquisition Process."},{"key":"5_CR22","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-030-64221-1_20","volume-title":"Advances in Neural Networks \u2013 ISNN 2020: 17th International Symposium on Neural Networks, ISNN 2020, Cairo, Egypt, December 4\u20136, 2020, Proceedings","author":"A Kuznetsova","year":"2020","unstructured":"Kuznetsova, A., Maleva, T., Soloviev, V.: Detecting apples in orchards using YOLOv3 and YOLOv5 in general and close-up images. In: Han, M., Qin, S., Zhang, N. (eds.) Advances in Neural Networks \u2013 ISNN 2020: 17th International Symposium on Neural Networks, ISNN 2020, Cairo, Egypt, December 4\u20136, 2020, Proceedings, pp. 233\u2013243. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64221-1_20"},{"key":"5_CR23","unstructured":"Purkait, P., Zhao, C., Zach, C.: SPP-Net: Deep Absolute Pose Regression with Synthetic Views (2017)"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., et al.: Deep residual learning for image recognition. In: Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR); IEEE. pp. 770\u20138 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"issue":"11","key":"5_CR25","doi-asserted-by":"publisher","first-page":"4758","DOI":"10.3390\/app11114758","volume":"11","author":"A Malta","year":"2021","unstructured":"Malta, A., Mendes, M., Farinha, T.: Augmented reality maintenance assistant using YOLOv5. Appl. Sci. 11(11), 4758 (2021)","journal-title":"Appl. Sci."},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Zhu, D., Xu, G., Zhou, J., et al.: Object detection in complex road scenarios: improved YOLOv4-tiny algorithm. In: 2021 2nd Information Communication Technologies Conference (ICTC) (2021)","DOI":"10.1109\/ICTC51749.2021.9441643"},{"issue":"2","key":"5_CR27","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.3906\/elk-2008-66","volume":"29","author":"MM Zbek","year":"2021","unstructured":"Zbek, M.M., Syed, M., Ksz, L.: Subjective analysis of social distance monitoring using YOLO v3 architecture and crowd tracking system. Turk. J. Electr. Eng. Comput. Sci. 29(2), 1157\u20131170 (2021)","journal-title":"Turk. J. Electr. Eng. Comput. Sci."},{"key":"5_CR28","unstructured":"Zhong, Z.F., Xia, Y.F., Zhou, D.P., Yan Y.T.: A lightweight target detection algorithm based on improved YOLOv4. Comput. Appl. 1\u20138 [2021\u201311\u201308]. http:\/\/kns.cnki.net\/kcms\/detail\/51.1307.TP.20210929.1334.012.html"},{"key":"5_CR29","doi-asserted-by":"publisher","unstructured":"Cheng, P., Zhang, Q., Tang, Z., Gui, W.: Research on mask wearing detection method based on YOLOv5 enhancement model. Comput. Eng. 1\u201312 [2021\u201311\u201308]. https:\/\/doi.org\/10.19678\/j.issn.1000-3428.0061502","DOI":"10.19678\/j.issn.1000-3428.0061502"},{"issue":"02","key":"5_CR30","first-page":"117","volume":"35","author":"L Qingping","year":"2021","unstructured":"Qingping, L., Qilin, Z., Lei, X.: A remote sensing image target recognition method using improved YOLOv5 network. J. Air Force Early Warning Coll. 35(02), 117\u2013120 (2021)","journal-title":"J. Air Force Early Warning Coll."},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Redmon, J., Divvala, S., Girshick, R., et al.: You Only Look Once: Unified, Real-Time Object Detection. Computer Vision & Pattern Recognition. IEEE, 779\u2013788 (2016)","DOI":"10.1109\/CVPR.2016.91"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-06788-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T12:20:17Z","timestamp":1657714817000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-06788-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031067877","9783031067884"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-06788-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"4 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qinghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1124","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}