{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:36:54Z","timestamp":1772908614938,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"22","license":[{"start":{"date-parts":[[2022,7,21]],"date-time":"2022-07-21T00:00:00Z","timestamp":1658361600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,21]],"date-time":"2022-07-21T00:00:00Z","timestamp":1658361600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972351"],"award-info":[{"award-number":["61972351"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62111530300"],"award-info":[{"award-number":["62111530300"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Public Welfare Technology Research Project of Zhejiang Province","award":["LGF19G010002"],"award-info":[{"award-number":["LGF19G010002"]}]},{"name":"Public Welfare Technology Research Project of Zhejiang Province","award":["LGF20G010002"],"award-info":[{"award-number":["LGF20G010002"]}]},{"DOI":"10.13039\/501100017599","name":"Science and Technology Program of Zhejiang Province","doi-asserted-by":"crossref","award":["2022C01005"],"award-info":[{"award-number":["2022C01005"]}],"id":[{"id":"10.13039\/501100017599","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s00521-022-07578-7","type":"journal-article","created":{"date-parts":[[2022,7,21]],"date-time":"2022-07-21T22:02:23Z","timestamp":1658440943000},"page":"20285-20298","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Handling occlusion in prohibited item detection from X-ray images"],"prefix":"10.1007","volume":"34","author":[{"given":"Dongsheng","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0596-1209","authenticated-orcid":false,"given":"Yan","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Zhaocheng","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Guotang","family":"Jian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,21]]},"reference":[{"key":"7578_CR1","doi-asserted-by":"crossref","unstructured":"Akcay S, Atapour-Abarghouei A, Breckon TP (2018) Ganomaly: semi-supervised anomaly detection via adversarial training. In: Asian conference on computer vision, pp 622\u2013637","DOI":"10.1007\/978-3-030-20893-6_39"},{"issue":"9","key":"7578_CR2","doi-asserted-by":"publisher","first-page":"2203","DOI":"10.1109\/TIFS.2018.2812196","volume":"13","author":"S Akcay","year":"2018","unstructured":"Akcay S, Kundegorski ME, Willcocks CG et al (2018) Using deep convolutional neural network architectures for object classification and detection within x-ray baggage security imagery. IEEE Trans Inf Forens Security 13(9):2203\u20132215","journal-title":"IEEE Trans Inf Forens Security"},{"key":"7578_CR3","doi-asserted-by":"crossref","unstructured":"Cui Y, Oztan B (2019) Automated firearms detection in cargo x-ray images using retinanet. In: Anomaly detection and imaging with X-Rays (ADIX) IV, p 109990P","DOI":"10.1117\/12.2517817"},{"key":"7578_CR4","doi-asserted-by":"crossref","unstructured":"Fu J, Liu J, Tian H et\u00a0al (2019) Dual attention network for scene segmentation. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 3146\u20133154","DOI":"10.1109\/CVPR.2019.00326"},{"key":"7578_CR5","doi-asserted-by":"crossref","unstructured":"Ghiasi G, Cui Y, Srinivas A et\u00a0al (2021) Simple copy-paste is a strong data augmentation method for instance segmentation. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 2918\u20132928","DOI":"10.1109\/CVPR46437.2021.00294"},{"key":"7578_CR6","unstructured":"Hacohen G, Weinshall D (2019) On the power of curriculum learning in training deep networks. In: International conference on machine learning, pp 2535\u20132544"},{"key":"7578_CR7","unstructured":"Hassan T, Akcay S, Bennamoun M et\u00a0al (2020) Cascaded structure tensor framework for robust identification of heavily occluded baggage items from x-ray scans. arXiv preprint arXiv:2004.06780"},{"key":"7578_CR8","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, et\u00a0al (2016) Identity mappings in deep residual networks. In: Proceedings of the european conference on computer vision, pp 630\u2013645","DOI":"10.1007\/978-3-319-46493-0_38"},{"key":"7578_CR9","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.patrec.2019.01.014","volume":"120","author":"DK Jain","year":"2019","unstructured":"Jain DK et al (2019) An evaluation of deep learning based object detection strategies for threat object detection in baggage security imagery. Pattern Recogn Lett 120:112\u2013119","journal-title":"Pattern Recogn Lett"},{"key":"7578_CR10","doi-asserted-by":"crossref","unstructured":"Lin TY, Goyal P, Girshick R, et\u00a0al (2017) Focal loss for dense object detection. In: Proceedings of the IEEE international conference on computer vision, pp 2980\u20132988","DOI":"10.1109\/ICCV.2017.324"},{"key":"7578_CR11","doi-asserted-by":"crossref","unstructured":"Liu JJ, Hou Q, Cheng MM et\u00a0al (2019) A simple pooling-based design for real-time salient object detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 3917\u20133926","DOI":"10.1109\/CVPR.2019.00404"},{"key":"7578_CR12","doi-asserted-by":"crossref","unstructured":"Liu Z, Lin Y, Cao Y, et\u00a0al (2021) Swin transformer: Hierarchical vision transformer using shifted windows. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 10012\u201310022","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"7578_CR13","doi-asserted-by":"crossref","unstructured":"Miao C, Xie L, Wan F, et\u00a0al (2019) Sixray: A large-scale security inspection x-ray benchmark for prohibited item discovery in overlapping images. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 2119\u20132128","DOI":"10.1109\/CVPR.2019.00222"},{"key":"7578_CR14","doi-asserted-by":"crossref","unstructured":"Qiao S, Chen LC, Yuille A (2021) Detectors: Detecting objects with recursive feature pyramid and switchable atrous convolution. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 10213\u201310224","DOI":"10.1109\/CVPR46437.2021.01008"},{"key":"7578_CR15","first-page":"91","volume":"28","author":"S Ren","year":"2015","unstructured":"Ren S, He K, Girshick R et al (2015) Faster r-cnn: Towards real-time object detection with region proposal networks. Proc Adv Neural Inf Process Syst 28:91\u201399","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"7578_CR16","doi-asserted-by":"crossref","unstructured":"Tao R, Wei Y, Jiang X, Li H, Qin H, Wang J, Ma Y, Zhang L, Liu X (2021) Towards real-world x-ray security inspection: A high-quality benchmark and lateral inhibition module for prohibited items detection. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 10923\u201310932","DOI":"10.1109\/ICCV48922.2021.01074"},{"issue":"12","key":"7578_CR17","first-page":"1","volume":"22","author":"Y Tian","year":"2022","unstructured":"Tian Y, Chen T, Cheng G et al (2022) Global context assisted structure-aware vehicle retrieval. IEEE Trans Intell Transp Syst 22(12):1\u201310","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"7578_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.107158","volume":"100","author":"Y Tian","year":"2020","unstructured":"Tian Y, Cheng G, Gelernter J et al (2020) Joint temporal context exploitation and active learning for video segmentation. Pattern Recogn 100:107158","journal-title":"Pattern Recogn"},{"key":"7578_CR19","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.neucom.2017.09.098","volume":"280","author":"Y Tian","year":"2018","unstructured":"Tian Y, Gelernter J, Wang X et al (2018) Lane marking detection via deep convolutional neural network. Neurocomputing 280:46\u201355","journal-title":"Neurocomputing"},{"issue":"12","key":"7578_CR20","doi-asserted-by":"publisher","first-page":"4466","DOI":"10.1109\/TITS.2018.2886283","volume":"20","author":"Y Tian","year":"2019","unstructured":"Tian Y, Gelernter J, Wang X et al (2019) Traffic sign detection using a multi-scale recurrent attention network. IEEE Trans Intell Transp Syst 20(12):4466\u20134475","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"7578_CR21","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.neucom.2019.01.104","volume":"347","author":"Y Tian","year":"2019","unstructured":"Tian Y, Hu W, Jiang H et al (2019) Densely connected attentional pyramid residual network for human pose estimation. Neurocomputing 347:13\u201323","journal-title":"Neurocomputing"},{"key":"7578_CR22","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.neucom.2017.01.098","volume":"253","author":"Y Tian","year":"2017","unstructured":"Tian Y, Wang H, Wang X (2017) Object localization via evaluation multi-task learning. Neurocomputing 253:34\u201341","journal-title":"Neurocomputing"},{"key":"7578_CR23","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1613\/jair.1.11338","volume":"64","author":"Y Tian","year":"2019","unstructured":"Tian Y, Wang X, Wu J et al (2019) Multi-scale hierarchical residual network for dense captioning. J Artif Intell Res 64:181\u2013196","journal-title":"J Artif Intell Res"},{"key":"7578_CR24","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1145\/3504033","volume":"18","author":"Y Tian","year":"2022","unstructured":"Tian Y, Zhang Y, Xu H et al (2022) 3d tooth instance segmentation learning objectness and affinity in point cloud. ACM Trans Multimed Comput Commun Appl 18:202\u2013211","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"key":"7578_CR25","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1016\/j.neucom.2020.07.078","volume":"417","author":"Y Tian","year":"2020","unstructured":"Tian Y, Zhang Y, Zhou D et al (2020) Triple attention network for video segmentation. Neurocomputing 417:202\u2013211","journal-title":"Neurocomputing"},{"key":"7578_CR26","unstructured":"Vaswani A, Shazeer N, Parmar N, et\u00a0al (2017) Attention is all you need. In: Proceedings of the advances in neural information processing systems, pp 5998\u20136008"},{"key":"7578_CR27","doi-asserted-by":"crossref","unstructured":"Wang CY, Bochkovskiy A, Liao HYM (2021) Scaled-yolov4: Scaling cross stage partial network. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 13029\u201313038","DOI":"10.1109\/CVPR46437.2021.01283"},{"key":"7578_CR28","doi-asserted-by":"crossref","unstructured":"Wang X, Girshick R, Gupta A, et\u00a0al. (2018) Non-local neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 7794\u20137803","DOI":"10.1109\/CVPR.2018.00813"},{"key":"7578_CR29","doi-asserted-by":"crossref","unstructured":"Wei Y, Tao R, Wu Z, et\u00a0al. (2020) Occluded prohibited items detection: An x-ray security inspection benchmark and de-occlusion attention module. In: Proceedings of the ACM international conference on multimedia, pp 138\u2013146","DOI":"10.1145\/3394171.3413828"},{"key":"7578_CR30","unstructured":"Yang J, Li C, Zhang P, et\u00a0al. (2020) Focal self-attention for local-global interactions in vision transformers. In: Proceedings of the advances in neural information processing systems, pp 138\u2013146"},{"key":"7578_CR31","doi-asserted-by":"crossref","unstructured":"Yu J, Lin Z, Yang J, et\u00a0al. (2019) Free-form image inpainting with gated convolution. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 4471\u20134480","DOI":"10.1109\/ICCV.2019.00457"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-022-07578-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-022-07578-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-022-07578-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T21:01:50Z","timestamp":1666299710000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-022-07578-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,21]]},"references-count":31,"journal-issue":{"issue":"22","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["7578"],"URL":"https:\/\/doi.org\/10.1007\/s00521-022-07578-7","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,21]]},"assertion":[{"value":"19 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that they have no conflicts of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}