{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:21:34Z","timestamp":1772119294022,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T00:00:00Z","timestamp":1696291200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T00:00:00Z","timestamp":1696291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572162"],"award-info":[{"award-number":["61572162"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572251"],"award-info":[{"award-number":["61572251"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802095"],"award-info":[{"award-number":["61802095"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702144"],"award-info":[{"award-number":["61702144"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Zhejiang Provincial Key Science and Technology Project Foundation","award":["2018C01012"],"award-info":[{"award-number":["2018C01012"]}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LQ17F020003"],"award-info":[{"award-number":["LQ17F020003"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s00500-023-09225-2","type":"journal-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T08:03:21Z","timestamp":1696320201000},"page":"5125-5135","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Occlusion-robust workflow recognition with context-aware compositional ConvNet"],"prefix":"10.1007","volume":"28","author":[{"given":"Min","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Haiyang","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Zhongjin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,3]]},"reference":[{"key":"9225_CR1","unstructured":"Arthur D, Vassilvitskii S (2007) k-means plus plus: the advantages of careful seeding. In: Proceedings of the eighteenth annual Acm-Siam symposium on discrete algorithms, pp 1027\u20131035"},{"key":"9225_CR2","first-page":"1345","volume":"6","author":"A Banerjee","year":"2005","unstructured":"Banerjee A, Dhillon IS, Ghosh J, Sra S (2005) Clustering on the unit hypersphere using von Mises-Fisher distributions. J Mach Learn Res 6:1345\u20131382","journal-title":"J Mach Learn Res"},{"key":"9225_CR3","unstructured":"Bienenstock E, Geman S (1998) Compositionality in neural systems. In: The handbook of brain theory and neural networks, pp 223\u2013226"},{"key":"9225_CR4","unstructured":"Bochkovskiy A, Wang CY, Liao HYM (2020) Yolov4: optimal speed and accuracy of object detection. arXiv:2004.10934"},{"key":"9225_CR5","doi-asserted-by":"crossref","unstructured":"Cai Z, Vasconcelos N (2018) Cascade r-cnn: delving into high quality object detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 6154\u20136162","DOI":"10.1109\/CVPR.2018.00644"},{"key":"9225_CR6","doi-asserted-by":"crossref","unstructured":"Deng J, Dong W, Socher R, Li LJ, Li K, Fei-Fei L (2009) Imagenet: a large-scale hierarchical image database. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 248\u2013255","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"9225_CR7","unstructured":"DeVries T, Taylor GW (2017) Improved regularization of convolutional neural networks with cutout. arXiv:1708.04552"},{"key":"9225_CR8","unstructured":"Fidler S, Boben M, Leonardis A (2014) Learning a hierarchical compositional shape vocabulary for multi-class object representation. arXiv:1408.5516"},{"issue":"1\u20132","key":"9225_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/0010-0277(88)90031-5","volume":"28","author":"JA Fodor","year":"1988","unstructured":"Fodor JA, Pylyshyn ZW (1988) Connectionism and cognitive architecture: a critical analysis. Cognition 28(1\u20132):3\u201371","journal-title":"Cognition"},{"key":"9225_CR10","doi-asserted-by":"publisher","first-page":"6368","DOI":"10.1126\/science.aag2612","volume":"358","author":"D George","year":"2017","unstructured":"George D et al (2017) A generative vision model that trains with high data efficiency and breaks text-based captchas. Science 358:6368","journal-title":"Science"},{"key":"9225_CR11","doi-asserted-by":"crossref","unstructured":"Girshick R, Donahue J, Darrell T, Malik J (2014) Rich feature hierarchies for accurate object detection and semantic segmentation. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 580\u2013587","DOI":"10.1109\/CVPR.2014.81"},{"key":"9225_CR12","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"9225_CR13","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.patrec.2018.10.011","volume":"130","author":"H Hu","year":"2020","unstructured":"Hu H, Cheng K, Li Z, Chen J, Hu H (2020) Workflow recognition with structured two-stream convolutional networks. Pattern Recogn Lett 130:267\u2013274","journal-title":"Pattern Recogn Lett"},{"key":"9225_CR14","unstructured":"Jin Y, Geman S (2006) Context and hierarchy in a probabilistic image model. In: IEEE computer society conference on computer vision and pattern recognition workshops, pp 2145\u20132152"},{"key":"9225_CR15","unstructured":"Kingma DP, Ba J (2014) Adam: a method for stochastic optimization. arXiv:1412.6980"},{"key":"9225_CR16","unstructured":"Kortylewski A (2017) Model-based image analysis for forensic shoe print recognition. PhD Thesis, University of Basel"},{"key":"9225_CR17","doi-asserted-by":"crossref","unstructured":"Kortylewski A, He J, Liu Q, Yuille LA (2020a) Compositional convolutional neural networks: a deep architecture with innate robustness to partial occlusion. In: Proceedings of computer vision and pattern recognition, pp 8940\u20138949","DOI":"10.1109\/CVPR42600.2020.00896"},{"key":"9225_CR18","doi-asserted-by":"crossref","unstructured":"Kortylewski A, Liu Q, Wang H, Zhang Z, Yuille A (2020b) Combining compositional models and deep networks for robust object classification under occlusion. In: IEEE Winter conference on applications of computer vision workshops, pp 1333\u20131341","DOI":"10.1109\/WACV45572.2020.9093560"},{"key":"9225_CR19","doi-asserted-by":"crossref","unstructured":"Lampert CH, Blaschko MB, Hofmann T (2008) Beyond sliding windows: object localization by efficient subwindow search. In: Proceedings of computer vision and pattern recognition, pp 1\u20138","DOI":"10.1109\/CVPR.2008.4587586"},{"key":"9225_CR20","doi-asserted-by":"crossref","unstructured":"Law H, Deng J (2018) Cornernet: detecting objects as paired keypoints. In: Proceedings of European conference on computer vision, pp 734\u2013750","DOI":"10.1007\/978-3-030-01264-9_45"},{"key":"9225_CR21","unstructured":"Liao R, Schwing A, Zemel R, Urtasun R (2016) Learning deep parsimonious representations. In: Proceedings of international conference neural information processing systems, pp 5076\u20135084"},{"key":"9225_CR22","doi-asserted-by":"crossref","unstructured":"Lin TY, Maire M, Belongie S, Hays J, Perona P, Ramanan D, Zitnick CL (2014) Microsoft coco: common objects in context. In: Proceedings of European conference on computer vision, pp 740\u2013755","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"9225_CR23","doi-asserted-by":"crossref","unstructured":"Makantasis K, Doulamis A, Doulamis N, Psychas K (2016) Deep learning based human behavior recognition in industrial workflows. In: Proceedings of international conference image processing, pp 1609\u20131613","DOI":"10.1109\/ICIP.2016.7532630"},{"key":"9225_CR24","doi-asserted-by":"crossref","unstructured":"Mannhardt F, Bovo R, Oliveira MF, Julier S (2018) A taxonomy for combining activity recognition and process discovery in industrial environments. In: Lecture notes in computer science, pp 84\u201393","DOI":"10.1007\/978-3-030-03496-2_10"},{"key":"9225_CR25","doi-asserted-by":"crossref","unstructured":"Reddy ND, Vo M, Narasimhan SG (2019) Occlusion-net: 2d\/3d occluded keypoint localization using graph networks. In: Proceedings of computer vision and pattern recognition, pp 7326\u20137335","DOI":"10.1109\/CVPR.2019.00750"},{"key":"9225_CR26","unstructured":"Ren S, He K, Girshick R, Sun J (2015) Faster r-cnn: towards real-time object detection with region proposal networks. In: Proceedings of international conference on neural information processing systems, pp 91\u201399"},{"issue":"4","key":"9225_CR27","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1016\/j.cub.2018.01.051","volume":"28","author":"D Sasikumar","year":"2018","unstructured":"Sasikumar D, Emeric E, Stuphorn V, Connor CE (2018) First-pass processing of value cues in the ventral visual pathway. Curr Biol 28(4):538\u2013548","journal-title":"Curr Biol"},{"key":"9225_CR28","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556"},{"key":"9225_CR29","doi-asserted-by":"crossref","unstructured":"Voulodimos A et\u00a0al (2011) A dataset for workflow recognition in industrial scenes. In: Proceedings of international conference image processing, pp 3249\u20133252","DOI":"10.1109\/ICIP.2011.6116362"},{"key":"9225_CR30","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MMUL.2012.31","volume":"3","author":"A Voulodimos","year":"2012","unstructured":"Voulodimos A et al (2012) A threefold dataset for activity and workflow recognition in complex industrial environments. IEEE Multimed 3:42\u201352","journal-title":"IEEE Multimed"},{"key":"9225_CR31","doi-asserted-by":"crossref","unstructured":"Wang J, Xie C, Zhang Z, Zhu J, Xie L, Yuille A (2017a) Detecting semantic parts on partially occluded objects. arXiv:1707.07819","DOI":"10.5244\/C.31.73"},{"key":"9225_CR32","doi-asserted-by":"crossref","unstructured":"Wang J et\u00a0al (2017b) Detecting semantic parts on partially occluded objects. arXiv:1707.07819","DOI":"10.5244\/C.31.73"},{"key":"9225_CR33","doi-asserted-by":"crossref","unstructured":"Xiang Y, Savarese S (2013) Object detection by 3d aspectlets and occlusion reasoning. In: IEEE international conference on computer vision workshops, ICCVW, pp 530\u2013537","DOI":"10.1109\/ICCVW.2013.75"},{"key":"9225_CR34","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1016\/j.sigpro.2014.10.030","volume":"110","author":"S Yan","year":"2015","unstructured":"Yan S, Liu Q (2015) Inferring occluded features for fast object detection. Signal Process 110:188\u2013198","journal-title":"Signal Process"},{"issue":"2","key":"9225_CR35","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s11263-014-0781-x","volume":"113","author":"Y Yang","year":"2015","unstructured":"Yang Y, Ma Z, Nie F, Chang X, Hauptmann AG (2015) Multi-class active learning by uncertainty sampling with diversity maximization. Int J Comput Vis 113(2):113\u2013127","journal-title":"Int J Comput Vis"},{"key":"9225_CR36","unstructured":"Zhang L, Wang QW (2018) Xiolift database. https:\/\/pan.baidu.com\/s\/1ySILNURWDN40q5TpAvGKUA"},{"key":"9225_CR37","doi-asserted-by":"crossref","unstructured":"Zhang S, Wen L, Bian X, Lei Z, Li SZ (2018a) Occlusion-aware r-cnn: detecting pedestrians in a crowd. In: Proceedings of European conference on computer vision, pp 637\u2013653","DOI":"10.1007\/978-3-030-01219-9_39"},{"key":"9225_CR38","doi-asserted-by":"crossref","unstructured":"Zhang Z, Xie C, Wang J, Xie L, Yuille AL (2018b) Deepvoting: a robust and explainable deep network for semantic part detection under partial occlusion. In: Proceedings of computer vision and pattern Recognition, pp 1372\u20131380","DOI":"10.1109\/CVPR.2018.00149"},{"key":"9225_CR39","unstructured":"Zhou X, Wang D, Kr\u00e4henb\u00fchl P (2019) Objects as points. arXiv:1904.07850"},{"key":"9225_CR40","unstructured":"Zhu H, Tang F, Park J, Park S, Yuille A (2019) Robustness of object recognition under extreme occlusion in humans and computational models. arXiv:1905.04598"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-09225-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-023-09225-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-09225-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T09:14:47Z","timestamp":1709198087000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-023-09225-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,3]]},"references-count":40,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["9225"],"URL":"https:\/\/doi.org\/10.1007\/s00500-023-09225-2","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-407785\/v1","asserted-by":"object"}]},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,3]]},"assertion":[{"value":"9 September 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 October 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This research does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}