{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T22:13:42Z","timestamp":1772921622019,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s00371-024-03725-4","type":"journal-article","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T18:08:09Z","timestamp":1732730889000},"page":"5347-5359","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["X-ray security inspection for real-world rail transit hubs: a wide-ranging dataset and detection model with incremental learning block"],"prefix":"10.1007","volume":"41","author":[{"given":"Xizhuo","family":"Yu","sequence":"first","affiliation":[]},{"given":"Chaojie","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Jiandong","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Guoliang","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Chunyang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Tianjian","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Hanwen","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,27]]},"reference":[{"key":"3725_CR1","doi-asserted-by":"publisher","unstructured":"A. Schwaninger, A. Bolfing, T. Halbherr, S. Helman, A. Belyavin, and L. Hay, The impact of image based factors and training on threat detection performance in X-ray screening. 2008. https:\/\/doi.org\/10.13140\/RG.2.1.1299.3526","DOI":"10.13140\/RG.2.1.1299.3526"},{"issue":"4","key":"3725_CR2","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1086\/519816","volume":"50","author":"G Blalock","year":"2007","unstructured":"Blalock, G., Kadiyali, V., Simon, D.H.: The impact of post-9\/11 airport security measures on the demand for air travel. J. Law Econ. 50(4), 731\u2013755 (2007). https:\/\/doi.org\/10.1086\/519816","journal-title":"J. Law Econ."},{"key":"3725_CR3","doi-asserted-by":"publisher","unstructured":"Y. LeCun, Y. Bengio, and G. Hinton, \u2018Deep learning\u2019, Nature, vol. 521, no. 7553, Art. no. 7553, May 2015, https:\/\/doi.org\/10.1038\/nature14539.","DOI":"10.1038\/nature14539"},{"issue":"10","key":"3725_CR4","doi-asserted-by":"publisher","first-page":"10248","DOI":"10.1109\/TIE.2020.3026285","volume":"68","author":"B Gu","year":"2021","unstructured":"Gu, B., Ge, R., Chen, Y., Luo, L., Coatrieux, G.: Automatic and Robust object detection in X-ray baggage inspection using deep convolutional neural networks. IEEE Trans. Industr. Electron. 68(10), 10248\u201310257 (2021). https:\/\/doi.org\/10.1109\/TIE.2020.3026285","journal-title":"IEEE Trans. Industr. Electron."},{"key":"3725_CR5","doi-asserted-by":"publisher","unstructured":"D. Mery, \u2018X-Ray Testing by Computer Vision\u2019, in 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops, OR, USA: IEEE, Jun. 2013, pp. 360\u2013367. https:\/\/doi.org\/10.1109\/CVPRW.2013.61.","DOI":"10.1109\/CVPRW.2013.61"},{"key":"3725_CR6","doi-asserted-by":"publisher","unstructured":"C. Miao et al., \u2018SIXray: A Large-Scale Security Inspection X-Ray Benchmark for Prohibited Item Discovery in Overlapping Images\u2019, In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, USA: IEEE, Jun. 2019, pp. 2114\u20132123. https:\/\/doi.org\/10.1109\/CVPR.2019.00222.","DOI":"10.1109\/CVPR.2019.00222"},{"issue":"4","key":"3725_CR7","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/s10921-015-0315-7","volume":"34","author":"D Mery","year":"2015","unstructured":"Mery, D., et al.: GDXray: The database of X-ray images for nondestructive testing. J. Nondestruct. Eval. 34(4), 42 (2015). https:\/\/doi.org\/10.1007\/s10921-015-0315-7","journal-title":"J. Nondestruct. Eval."},{"key":"3725_CR8","doi-asserted-by":"crossref","unstructured":"Y. Wei, R. Tao, Z. Wu, Y. Ma, L. Zhang, and X. Liu, \u2018Occluded Prohibited Items Detection: an X-ray Security Inspection Benchmark and De-occlusion Attention Module\u2019. arXiv, Aug. 13, 2020. Accessed: Aug. 13, 2023. [Online]. Available: http:\/\/arxiv.org\/abs\/2004.08656","DOI":"10.1145\/3394171.3413828"},{"key":"3725_CR9","doi-asserted-by":"publisher","unstructured":"R. Tao et al., \u2018Exploring Endogenous Shift for Cross-domain Detection: A Large-scale Benchmark and Perturbation Suppression Network\u2019, In: 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Jun. 2022, pp. 21157\u201321167. https:\/\/doi.org\/10.1109\/CVPR52688.2022.02051.","DOI":"10.1109\/CVPR52688.2022.02051"},{"key":"3725_CR10","unstructured":"R. Tao et al., \u2018Towards Real-world X-ray Security Inspection: A High-Quality Benchmark and Lateral Inhibition Module for Prohibited Items Detection\u2019. arXiv, Aug. 22, 2021. Accessed: Aug. 19, 2023. [Online]. Available: http:\/\/arxiv.org\/abs\/2108.09917"},{"key":"3725_CR11","doi-asserted-by":"publisher","unstructured":"R. Tao, T. Wang, Z. Wu, C. Liu, A. Liu, and X. Liu, \u2018Few-shot X-ray Prohibited Item Detection: A Benchmark and Weak-feature Enhancement Network\u2019, In: Proceedings of the 30th ACM International Conference on Multimedia, Lisboa Portugal: ACM, Oct. 2022, pp. 2012\u20132020. https:\/\/doi.org\/10.1145\/3503161.3548075.","DOI":"10.1145\/3503161.3548075"},{"issue":"9","key":"3725_CR12","doi-asserted-by":"publisher","first-page":"2203","DOI":"10.1109\/TIFS.2018.2812196","volume":"13","author":"S Akcay","year":"2018","unstructured":"Akcay, S., Kundegorski, M.E., Willcocks, C.G., Breckon, T.P.: Using deep convolutional neural network architectures for object classification and detection within X-ray baggage security imagery. IEEE Trans. Inf. Forensic Secur. 13(9), 2203\u20132215 (2018). https:\/\/doi.org\/10.1109\/TIFS.2018.2812196","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"11","key":"3725_CR13","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y Lecun","year":"1998","unstructured":"Lecun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998). https:\/\/doi.org\/10.1109\/5.726791","journal-title":"Proc. IEEE"},{"key":"3725_CR14","unstructured":"A. Vaswani et al., \u2018Attention is All you Need\u2019, in Advances in Neural Information Processing Systems, Curran Associates, Inc., 2017. Accessed: Dec. 25, 2023. [Online]. Available: https:\/\/proceedings.neurips.cc\/paper\/2017\/hash\/3f5ee243547dee91fbd053c1c4a845aa-Abstract.html"},{"key":"3725_CR15","doi-asserted-by":"publisher","unstructured":"W. Liu et al., \u2018SSD: Single Shot MultiBox Detector\u2019, in Computer Vision \u2013 ECCV 2016, vol. 9905, B. Leibe, J. Matas, N. Sebe, and M. Welling, Eds., in Lecture Notes in Computer Science, vol. 9905. , Cham: Springer International Publishing, 2016, pp. 21\u201337. https:\/\/doi.org\/10.1007\/978-3-319-46448-0_2.","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"3725_CR16","doi-asserted-by":"publisher","unstructured":"J. Redmon, S. Divvala, R. Girshick, and A. Farhadi, \u2018You Only Look Once: Unified, Real-Time Object Detection\u2019, In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA: IEEE, Jun. 2016, pp. 779\u2013788. https:\/\/doi.org\/10.1109\/CVPR.2016.91.","DOI":"10.1109\/CVPR.2016.91"},{"issue":"21","key":"3725_CR17","doi-asserted-by":"publisher","first-page":"10261","DOI":"10.3390\/app112110261","volume":"11","author":"JK Dumagpi","year":"2021","unstructured":"Dumagpi, J.K., Jeong, Y.-J.: Pixel-level analysis for enhancing threat detection in large-scale X-ray security images. Appl. Sci. 11(21), 10261 (2021). https:\/\/doi.org\/10.3390\/app112110261","journal-title":"Appl. Sci."},{"issue":"4","key":"3725_CR18","doi-asserted-by":"publisher","first-page":"565","DOI":"10.3390\/mi13040565","volume":"13","author":"HD Nguyen","year":"2022","unstructured":"Nguyen, H.D., Cai, R., Zhao, H., Kot, A.C., Wen, B.: Towards more efficient security inspection via deep learning: a task-driven X-ray image cropping scheme. Micromachines 13(4), 565 (2022). https:\/\/doi.org\/10.3390\/mi13040565","journal-title":"Micromachines"},{"key":"3725_CR19","doi-asserted-by":"publisher","unstructured":"J. Liu, X. Leng, and Y. Liu, \u2018Deep Convolutional Neural Network Based Object Detector for X-Ray Baggage Security Imagery\u2019, In: 2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI), Nov. 2019, pp. 1757\u20131761. https:\/\/doi.org\/10.1109\/ICTAI.2019.00262.","DOI":"10.1109\/ICTAI.2019.00262"},{"key":"3725_CR20","unstructured":"S. Ren, K. He, R. Girshick, and J. Sun, \u2018Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks\u2019, In: Advances in Neural Information Processing Systems, Curran Associates, Inc., 2015. Accessed: Dec. 25, 2023. [Online]. Available: https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2015\/hash\/14bfa6bb14875e45bba028a21ed38046-Abstract.html"},{"key":"3725_CR21","doi-asserted-by":"publisher","unstructured":"C.-Y. Wang, A. Bochkovskiy, and H.-Y. M. Liao, \u2018YOLOv7: Trainable Bag-of-Freebies Sets New State-of-the-Art for Real-Time Object Detectors\u2019, In: 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Vancouver, BC, Canada: IEEE, Jun. 2023, pp. 7464\u20137475. https:\/\/doi.org\/10.1109\/CVPR52729.2023.00721.","DOI":"10.1109\/CVPR52729.2023.00721"},{"key":"3725_CR22","doi-asserted-by":"publisher","unstructured":"H. Rezatofighi, N. Tsoi, J. Gwak, A. Sadeghian, I. Reid, and S. Savarese, \u2018Generalized Intersection Over Union: A Metric and a Loss for Bounding Box Regression\u2019, In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, USA: IEEE, Jun. 2019, pp. 658\u2013666. https:\/\/doi.org\/10.1109\/CVPR.2019.00075.","DOI":"10.1109\/CVPR.2019.00075"},{"issue":"07","key":"3725_CR23","doi-asserted-by":"publisher","first-page":"12993","DOI":"10.1609\/aaai.v34i07.6999","volume":"34","author":"Z Zheng","year":"2020","unstructured":"Zheng, Z., Wang, P., Liu, W., Li, J., Ye, R., Ren, D.: Distance-IoU loss: faster and better learning for bounding box regression. AAAI 34(07), 12993\u201313000 (2020). https:\/\/doi.org\/10.1609\/aaai.v34i07.6999","journal-title":"AAAI"},{"key":"3725_CR24","unstructured":"Y.-F. Zhang, W. Ren, Z. Zhang, Z. Jia, L. Wang, and T. Tan, \u2018Focal and Efficient IOU Loss for Accurate Bounding Box Regression\u2019. arXiv, Jul. 15, 2022. Accessed: Nov. 27, 2023. [Online]. Available: http:\/\/arxiv.org\/abs\/2101.08158"},{"key":"3725_CR25","unstructured":"Z. Tong, Y. Chen, Z. Xu, and R. Yu, \u2018Wise-IoU: Bounding Box Regression Loss with Dynamic Focusing Mechanism\u2019. arXiv, Apr. 08, 2023. Accessed: Nov. 27, 2023. [Online]. Available: http:\/\/arxiv.org\/abs\/2301.10051"},{"issue":"6","key":"3725_CR26","doi-asserted-by":"publisher","first-page":"1789","DOI":"10.1007\/s11263-021-01453-z","volume":"129","author":"J Gou","year":"2021","unstructured":"Gou, J., Yu, B., Maybank, S.J., Tao, D.: Knowledge distillation: a survey. Int. J. Comput. Vis. 129(6), 1789\u20131819 (2021). https:\/\/doi.org\/10.1007\/s11263-021-01453-z","journal-title":"Int. J. Comput. Vis."},{"key":"3725_CR27","unstructured":"G. Chen, W. Choi, X. Yu, T. Han, and M. Chandraker, \u2018Learning Efficient Object Detection Models with Knowledge Distillation\u2019, In: Advances in Neural Information Processing Systems, Curran Associates, Inc., 2017. Accessed: Nov. 27, 2023. [Online]. Available: https:\/\/proceedings.neurips.cc\/paper\/2017\/hash\/e1e32e235eee1f970470a3a6658dfdd5-Abstract.html"},{"key":"3725_CR28","doi-asserted-by":"publisher","unstructured":"L. Chen, C. Yu, and L. Chen, \u2018A New Knowledge Distillation for Incremental Object Detection\u2019, In: 2019 International Joint Conference on Neural Networks (IJCNN), Budapest, Hungary: IEEE, Jul. 2019, pp. 1\u20137. https:\/\/doi.org\/10.1109\/IJCNN.2019.8851980.","DOI":"10.1109\/IJCNN.2019.8851980"},{"issue":"12","key":"3725_CR29","doi-asserted-by":"publisher","first-page":"9209","DOI":"10.1109\/TPAMI.2021.3124133","volume":"44","author":"KJ Joseph","year":"2022","unstructured":"Joseph, K.J., Rajasegaran, J., Khan, S., Khan, F.S., Balasubramanian, V.N.: Incremental object detection via meta-learning. IEEE Trans. Pattern Anal. Mach. Intell. 44(12), 9209\u20139216 (2022). https:\/\/doi.org\/10.1109\/TPAMI.2021.3124133","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"3725_CR30","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-030-58452-8_13","volume-title":"Computer Vision \u2013 ECCV 2020","author":"N Carion","year":"2020","unstructured":"Carion, N., Massa, F., Synnaeve, G., Usunier, N., Kirillov, A., Zagoruyko, S.: End-to-End Object Detection with Transformers. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) Computer Vision \u2013 ECCV 2020, pp. 213\u2013229. Springer, Charm (2020)"}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-024-03725-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-024-03725-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-024-03725-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T08:46:25Z","timestamp":1747385185000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-024-03725-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,27]]},"references-count":30,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["3725"],"URL":"https:\/\/doi.org\/10.1007\/s00371-024-03725-4","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,27]]},"assertion":[{"value":"9 November 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}