{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T02:54:25Z","timestamp":1764557665405,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031204999"},{"type":"electronic","value":"9783031205002"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20500-2_25","type":"book-chapter","created":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T05:12:32Z","timestamp":1672549952000},"page":"303-314","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["UI Layers Group Detector: Grouping UI Layers via\u00a0Text Fusion and\u00a0Box Attention"],"prefix":"10.1007","author":[{"given":"Shuhong","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Tingting","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yunnong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Dengming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Liuqing","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Lingyun","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Shiyu","family":"Yue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,1]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"A\u015f\u0131ro\u011flu, B., et al.: Automatic html code generation from mock-up images using machine learning techniques. In: 2019 Scientific Meeting on Electrical-Electronics & Biomedical Engineering and Computer Science (EBBT), pp. 1\u20134 (2019)","DOI":"10.1109\/EBBT.2019.8741736"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Beltramelli, T.: pix2code: generating code from a graphical user interface screenshot. In: Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, pp. 1\u20136 (2018)","DOI":"10.1145\/3220134.3220135"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Bunian, S., et al.: Visual search for mobile user interface design. In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pp. 1\u201314 (2021)","DOI":"10.1145\/3411764.3445762"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Chen, J., et al.: Unblind your apps: Predicting natural-language labels for mobile GUI components by deep learning. In: 2020 IEEE\/ACM 42nd International Conference on Software Engineering (ICSE), pp. 322\u2013334. IEEE (2020)","DOI":"10.1145\/3377811.3380327"},{"key":"25_CR5","unstructured":"Chen, K., et al.: MMDetection: Open MMLAB detection toolbox and benchmark. arXiv preprint arXiv:1906.07155 (2019)"},{"key":"25_CR6","unstructured":"Chen, X., et al.: Microsoft coco captions: data collection and evaluation server. arXiv preprint arXiv:1504.00325 (2015)"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Dave, H., Sonje, S., Pardeshi, J., Chaudhari, S., Raundale, P.: A survey on artificial intelligence based techniques to convert user interface design mock-ups to code. In: 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), pp. 28\u201333 (2021)","DOI":"10.1109\/ICAIS50930.2021.9395994"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"He, K., Gkioxari, G., Doll\u00e1r, P., Girshick, R.: Mask r-cnn. In: Proceedings of the IEEE international conference on computer vision, pp. 2961\u20132969 (2017)","DOI":"10.1109\/ICCV.2017.322"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Kolesnikov, A., Kuznetsova, A., Lampert, C., Ferrari, V.: Detecting visual relationships using box attention. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision Workshops (2019)","DOI":"10.1109\/ICCVW.2019.00217"},{"key":"25_CR11","unstructured":"Kumar, A.: Automated front-end development using deep learning. https:\/\/blog.insightdatascience.com\/automated-front-end-development-using-deep-learning-3169dd086e82\/ (2018)"},{"key":"25_CR12","unstructured":"lab, A.: Intelligent code generation for design drafts (2021). http:\/\/www.imgcook.com\/"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Li, G., Baechler, G., Tragut, M., Li, Y.: Learning to denoise raw mobile UI layouts for improving datasets at scale. In: CHI Conference on Human Factors in Computing Systems, pp. 1\u201313 (2022),","DOI":"10.1145\/3491102.3502042"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., Doll\u00e1r, P., Girshick, R., He, K., Hariharan, B., Belongie, S.: Feature pyramid networks for object detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2117\u20132125 (2017)","DOI":"10.1109\/CVPR.2017.106"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., Goyal, P., Girshick, R., He, K., Doll\u00e1r, P.: Focal loss for dense object detection. In: 2017 IEEE International Conference on Computer Vision (ICCV), pp. 2999\u20133007 (2017)","DOI":"10.1109\/ICCV.2017.324"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Lin, T., et al.: Microsoft COCO: common objects in context. CoRR (2014), arXiv:1405.0312","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Ling, W., et al.: Latent predictor networks for code generation. arXiv preprint arXiv:1603.06744 (2016)","DOI":"10.18653\/v1\/P16-1057"},{"key":"25_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-46448-0_2","volume-title":"Computer Vision \u2013 ECCV 2016","author":"W Liu","year":"2016","unstructured":"Liu, W., et al.: SSD: Single Shot MultiBox Detector. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9905, pp. 21\u201337. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46448-0_2"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Liu, Z., Chen, C., Wang, J., Huang, Y., Hu, J., Wang, Q.: Owl eyes: spotting UI display issues via visual understanding. In: 2020 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 398\u2013409. IEEE (2020)","DOI":"10.1145\/3324884.3416547"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Nguyen, T.A., Csallner, C.: Reverse engineering mobile application user interfaces with remaui (t). In: 2015 30th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 248\u2013259 (2015)","DOI":"10.1109\/ASE.2015.32"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Redmon, J., Farhadi, A.: Yolo9000: better, faster, stronger. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 7263\u20137271 (2017)","DOI":"10.1109\/CVPR.2017.690"},{"issue":"6","key":"25_CR22","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/TPAMI.2016.2577031","volume":"39","author":"S Ren","year":"2017","unstructured":"Ren, S., He, K., Girshick, R., Sun, J.: Faster R-CNN: Towards real-time object detection with region proposal networks. IEEE Trans. Pattern Anal. Mach. Intell. 39(6), 1137\u20131149 (2017)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"25_CR23","unstructured":"Robinson, A.: Sketch2code: generating a website from a paper mockup. arXiv preprint arXiv:1905.13750 (2019)"},{"key":"25_CR24","doi-asserted-by":"crossref","unstructured":"Su, T.: Fsmdroid: guided GUI testing of android apps. In: 2016 IEEE\/ACM 38th International Conference on Software Engineering Companion (ICSE-C), pp. 689\u2013691 (2016)","DOI":"10.1145\/2889160.2891043"},{"key":"25_CR25","unstructured":"Wolf, T., et al.: Transformers: state-of-the-art natural language processing. In: Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: System Demonstrations, pp. 38\u201345 (2020)"},{"key":"25_CR26","doi-asserted-by":"crossref","unstructured":"Zang, X., Xu, Y., Chen, J.: Multimodal icon annotation for mobile applications. In: Proceedings of the 23rd International Conference on Mobile Human-Computer Interaction, pp. 1\u201311 (2021)","DOI":"10.1145\/3447526.3472064"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20500-2_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,19]],"date-time":"2023-03-19T16:12:42Z","timestamp":1679242362000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20500-2_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031204999","9783031205002"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20500-2_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"1 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CICAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"CAAI International Conference on Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 August 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cicai2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cicai.caai.cn\/#\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"472","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"164","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}