{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T15:25:31Z","timestamp":1775834731731,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819702923","type":"print"},{"value":"9789819702930","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-0293-0_21","type":"book-chapter","created":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T13:02:24Z","timestamp":1714136544000},"page":"279-289","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Application of Deep Learning Algorithms to Terahertz Images for Detection of Concealed Objects"],"prefix":"10.1007","author":[{"given":"Soumen","family":"Sardar","sequence":"first","affiliation":[]},{"given":"Sulaf","family":"Assi","sequence":"additional","affiliation":[]},{"given":"Iznora Aini","family":"Zolkifly","sequence":"additional","affiliation":[]},{"given":"Manoj","family":"Jayabalan","sequence":"additional","affiliation":[]},{"given":"Manea","family":"Alsaleem","sequence":"additional","affiliation":[]},{"given":"Ammar H.","family":"Mohammed","sequence":"additional","affiliation":[]},{"given":"Dhiya","family":"Al-Jumeily OBE","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,27]]},"reference":[{"issue":"2","key":"21_CR1","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MSP.2005.1406480","volume":"22","author":"HM Chen","year":"2005","unstructured":"Chen HM, Lee S, Rao RM, Slamani MA, Varshney PK (2005) Imaging for concealed weapon detection: a tutorial overview of development in imaging sensors and processing. IEEE Signal Process Mag 22(2):52\u201361","journal-title":"IEEE Signal Process Mag"},{"issue":"4","key":"21_CR2","doi-asserted-by":"publisher","first-page":"167","DOI":"10.4302\/plp.2013.4.16","volume":"5","author":"M Kowalski","year":"2013","unstructured":"Kowalski M, Kastek M, Palka N, Polakowski H, Szustakowski M, Piszczek M (2013) Investigation of concealed objects detection in visible, infrared and terahertz ranges of radiation. Photon Lett Poland 5(4):167\u2013169","journal-title":"Photon Lett Poland"},{"issue":"5","key":"21_CR3","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MSP.2022.3183808","volume":"39","author":"S Helal","year":"2022","unstructured":"Helal S, Sarieddeen H, Dahrouj H, Al-Naffouri TY, Alouini MS (2022) Signal processing and machine learning techniques for terahertz sensing: an overview. IEEE Signal Process Mag 39(5):42\u201362","journal-title":"IEEE Signal Process Mag"},{"issue":"16","key":"21_CR4","doi-asserted-by":"publisher","first-page":"1716","DOI":"10.1364\/OL.20.001716","volume":"20","author":"BB Hu","year":"1995","unstructured":"Hu BB, Nuss MC (1995) Imaging with terahertz waves. Opt Lett 20(16):1716\u20131718","journal-title":"Opt Lett"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Cheng YZ, Withayachumnankul W, Upadhyay A, Headland D, Nie Y, Gong RZ et al (2014) Ultrabroadband reflective polarization convertor for terahertz waves. Appl Phys Lett 105(18)","DOI":"10.1063\/1.4901272"},{"issue":"1","key":"21_CR6","doi-asserted-by":"publisher","first-page":"37","DOI":"10.33975\/riuq.vol34n1.853","volume":"34","author":"S Danso","year":"2022","unstructured":"Danso S, Liping S, Hu D, Odoom J, Quancheng L, Mushtag M (2022) Security inspection image processing methods applying wavelet transform filters on Terahertz active images. Revista de Investigaciones Universidad del Quind\u00edo 34(1):37\u201351","journal-title":"Revista de Investigaciones Universidad del Quind\u00edo"},{"issue":"8","key":"21_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3549932","volume":"55","author":"D Velayudhan","year":"2022","unstructured":"Velayudhan D, Hassan T, Damiani E, Werghi N (2022) Recent advances in baggage threat detection: a comprehensive and systematic survey. ACM Comput Surv 55(8):1\u201338","journal-title":"ACM Comput Surv"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Ahmed A, Velayudhan D, Hassan T, Hassan B, Dias J, Werghi N (2022, May) Baggage threat detection under extreme class imbalance. In: 2022 2nd international conference on digital futures and transformative technologies (ICoDT2), pp 1\u20136. IEEE","DOI":"10.1109\/ICoDT255437.2022.9787472"},{"key":"21_CR9","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.1016\/j.ijleo.2019.04.034","volume":"185","author":"D Liang","year":"2019","unstructured":"Liang D, Pan J, Yu Y, Zhou H (2019) Concealed object segmentation in terahertz imaging via adversarial learning. Optik 185:1104\u20131114","journal-title":"Optik"},{"issue":"3","key":"21_CR10","doi-asserted-by":"publisher","first-page":"345","DOI":"10.21037\/qims.2017.06.02","volume":"7","author":"Q Sun","year":"2017","unstructured":"Sun Q, He Y, Liu K, Fan S, Parrott EP, Pickwell-MacPherson E (2017) Recent advances in terahertz technology for biomedical applications. Quant Imaging Med Surg 7(3):345","journal-title":"Quant Imaging Med Surg"},{"issue":"2","key":"21_CR11","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/TTHZ.2018.2889407","volume":"9","author":"R Li","year":"2018","unstructured":"Li R, Li C, Li H, Wu S, Fang G (2018) Study of automatic detection of concealed targets in passive terahertz images for intelligent security screening. IEEE Trans Terahertz Sci Technol 9(2):165\u2013176","journal-title":"IEEE Trans Terahertz Sci Technol"},{"key":"21_CR12","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.neucom.2015.09.116","volume":"187","author":"Y Guo","year":"2016","unstructured":"Guo Y, Liu Y, Oerlemans A, Lao S, Wu S, Lew MS (2016) Deep learning for visual understanding: a review. Neurocomputing 187:27\u201348","journal-title":"Neurocomputing"},{"key":"21_CR13","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s11036-020-01672-7","volume":"26","author":"J Wang","year":"2021","unstructured":"Wang J, Zhu H, Wang SH, Zhang YD (2021) A review of deep learning on medical image analysis. Mob Netw Appl 26:351\u2013380","journal-title":"Mob Netw Appl"},{"issue":"1","key":"21_CR14","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s13735-021-00218-1","volume":"11","author":"S Suganyadevi","year":"2022","unstructured":"Suganyadevi S, Seethalakshmi V, Balasamy K (2022) A review on deep learning in medical image analysis. Int J Multimed Inform Retriev 11(1):19\u201338","journal-title":"Int J Multimed Inform Retriev"},{"issue":"8","key":"21_CR15","first-page":"300","volume":"8","author":"PT Bharathi","year":"2011","unstructured":"Bharathi PT, Subashini P (2011) Optimization of image processing techniques using neural networks: a review. WSEAS Trans Inf Sci Appl 8(8):300\u2013328","journal-title":"WSEAS Trans Inf Sci Appl"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Al-Saffar AAM, Tao H, Talab MA (2017, October) Review of deep convolution neural network in image classification. In: 2017 International conference on radar, antenna, microwave, electronics, and telecommunications (ICRAMET), pp 26\u201331. IEEE","DOI":"10.1109\/ICRAMET.2017.8253139"},{"issue":"22","key":"21_CR17","doi-asserted-by":"publisher","first-page":"4712","DOI":"10.3390\/rs13224712","volume":"13","author":"L Chen","year":"2021","unstructured":"Chen L, Li S, Bai Q, Yang J, Jiang S, Miao Y (2021) Review of image classification algorithms based on convolutional neural networks. Rem Sens 13(22):4712","journal-title":"Rem Sens"},{"key":"21_CR18","unstructured":"Hinton G (2022) The forward-forward algorithm: some preliminary investigations. arXiv preprint arXiv:2212.13345"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Liu G, Lan S, Zhang T, Huang W, Wang W (2021, September) SAGAN: skip-attention GAN for anomaly detection. In: 2021 IEEE international conference on image processing (ICIP), pp 2468\u20132472. IEEE","DOI":"10.1109\/ICIP42928.2021.9506332"},{"key":"21_CR20","unstructured":"Terahertz Imaging Dataset (2022) Available at: https:\/\/github.com\/LingLIx\/THz_Dataset. Accessed: 31 Aug 2023"},{"issue":"12","key":"21_CR21","doi-asserted-by":"publisher","first-page":"2465","DOI":"10.1109\/TIP.2008.2006662","volume":"17","author":"X Shen","year":"2008","unstructured":"Shen X, Dietlein CR, Grossman E, Popovic Z, Meyer FG (2008) Detection and segmentation of concealed objects in terahertz images. IEEE Trans Image Process 17(12):2465\u20132475","journal-title":"IEEE Trans Image Process"},{"key":"21_CR22","unstructured":"Karner C, Kazeev V, Petersen PC (2022) Limitations of gradient descent due to numerical instability of backpropagation. arXiv preprint arXiv:2210.00805"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Lin D, Lin Z, Sun L, Toh KA, Cao J (2017, May) LLC encoded BoW features and softmax regression for microscopic image classification. In: 2017 IEEE international symposium on circuits and systems (ISCAS), pp 1\u20134. IEEE","DOI":"10.1109\/ISCAS.2017.8050243"},{"issue":"9","key":"21_CR24","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1080\/07408170490473042","volume":"36","author":"AB Yeh","year":"2004","unstructured":"Yeh AB, Huwang L, Wu YF (2004) A likelihood-ratio-based EWMA control chart for monitoring variability of multivariate normal processes. IIE Trans 36(9):865\u2013879","journal-title":"IIE Trans"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Yang C, Lan S, Huang W, Wang W, Liu G, Yang H et al (2022, September) A transformer-based GAN for anomaly detection. In: International conference on artificial neural networks. Springer Nature, Cham, pp 345\u2013357","DOI":"10.1007\/978-3-031-15931-2_29"},{"key":"21_CR26","doi-asserted-by":"crossref","unstructured":"Hayat M, Khan S, Zamir SW, Shen J, Shao L (2019) Gaussian affinity for max-margin class imbalanced learning. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 6469\u20136479","DOI":"10.1109\/ICCV.2019.00657"},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Xiao H, Zhang R, Wang H, Zhu F, Zhang C, Dai H, Zhou Y (2018, October) R-pcnn method to rapidly detect objects on thz images in human body security checks. In: 2018 IEEE SmartWorld, ubiquitous intelligence & computing, advanced & trusted computing, scalable computing & communications, cloud & big data computing. Internet of People and Smart City Innovation SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI, pp 1777\u20131782. IEEE","DOI":"10.1109\/SmartWorld.2018.00300"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Data Science and Emerging Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-0293-0_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T13:07:56Z","timestamp":1714136876000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-0293-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819702923","9789819702930"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-0293-0_21","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"27 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DaSET","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Data Science and Emerging Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"daset2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icdaset.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}