{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T21:42:07Z","timestamp":1768686127451,"version":"3.49.0"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T00:00:00Z","timestamp":1693612800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T00:00:00Z","timestamp":1693612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00499-6","type":"journal-article","created":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T15:01:57Z","timestamp":1693666917000},"page":"397-414","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Machine learning methods for the industrial robotic systems security"],"prefix":"10.1007","volume":"20","author":[{"given":"Dmitry","family":"Tsapin","sequence":"first","affiliation":[]},{"given":"Kirill","family":"Pitelinskiy","sequence":"additional","affiliation":[]},{"given":"Stanislav","family":"Suvorov","sequence":"additional","affiliation":[]},{"given":"Aleksey","family":"Osipov","sequence":"additional","affiliation":[]},{"given":"Ekaterina","family":"Pleshakova","sequence":"additional","affiliation":[]},{"given":"Sergey","family":"Gataullin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,2]]},"reference":[{"key":"499_CR1","first-page":"1","volume":"24","author":"S Suthir","year":"2022","unstructured":"Suthir, S., Harshavardhanan, P., Subramani, K., Senthil, P., Veena, T., Faith, S.J., Nivethitha, V.: Conceptual approach on smart car parking system for industry 4.0 internet of things assisted networks. Meas. Sens. 24, 1\u20136 (2022)","journal-title":"Meas. Sens."},{"key":"499_CR2","doi-asserted-by":"publisher","unstructured":"Parygin, D.: Implementation of exoactive management model for urbanized area: real-time monitoring and proactive planning. In: Proceedings of the 2019 8th International Conference on System Modeling and Advancement in Research Trends, pp. 310\u2013316. https:\/\/doi.org\/10.1109\/SMART46866.2019.9117298","DOI":"10.1109\/SMART46866.2019.9117298"},{"key":"499_CR3","doi-asserted-by":"crossref","unstructured":"Parygin, D., Usov, A., Burov, S., Sadovnikova, N., Ostroukhov, P., Pyannikova, A.: Multi-agent approach to modeling the dynamics of urban processes (on the example of urban movements). Commun. Comput. Inf. Sci., 2020, 243\u2013257","DOI":"10.1007\/978-3-030-39296-3_18"},{"key":"499_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asej.2023.102178","volume":"14","author":"MM Abdellatif","year":"2023","unstructured":"Abdellatif, M.M., Elshabasy, N.H., Elashmawy, A.E., AbdelRaheem, M.: A low cost IoT-based Arabic license plate recognition model for smart parking systems. Ain Shams Eng. J. 14, 1\u20136 (2023)","journal-title":"Ain Shams Eng. J."},{"key":"499_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.aap.2023.107070","volume":"187","author":"H Kumagai","year":"2023","unstructured":"Kumagai, H., Kawaguchi, K., Sawatari, H., Kiyohara, Y., Hayashi, M., Shiomi, T.: Dashcam video footage-based analysis of microsleep-related behaviors in truck collisions attributed to falling asleep at the wheel. Accid. Anal. Prev. 187, 1\u20139 (2023)","journal-title":"Accid. Anal. Prev."},{"key":"499_CR6","doi-asserted-by":"crossref","unstructured":"Kanan, R., Arbess, H.: An IoT-based intelligent system for real-time parking monitoring and automatic billing. In: 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, pp. 622\u2013626","DOI":"10.1109\/ICIoT48696.2020.9089589"},{"key":"499_CR7","unstructured":"Finogeev, A., Finogeev, A., Fionova, L., Lyapin, A., Lychagin, K.: Intelligent monitoring system for smart road environment. J. Ind. Inf. Integr."},{"key":"499_CR8","doi-asserted-by":"publisher","first-page":"148","DOI":"10.3390\/sym14010148","volume":"14","author":"N Andriyanov","year":"2022","unstructured":"Andriyanov, N., Khasanshin, I., Utkin, D., Gataullin, T., Ignar, S., Shumaev, V., Soloviev, V.: Intelligent system for estimation of the spatial position of apples based on YOLOv3 and real sense depth camera D415. Symmetry 14, 148 (2022). https:\/\/doi.org\/10.3390\/sym14010148","journal-title":"Symmetry"},{"key":"499_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-023-00480-3","author":"V Ivanyuk","year":"2023","unstructured":"Ivanyuk, V.: Forecasting of digital financial crimes in Russia based on machine learning methods. J. Comput. Virol. Hack. Tech. (2023). https:\/\/doi.org\/10.1007\/s11416-023-00480-3","journal-title":"J. Comput. Virol. Hack. Tech."},{"key":"499_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-023-00486-x","author":"E Boltachev","year":"2023","unstructured":"Boltachev, E.: Potential cyber threats of adversarial attacks on autonomous driving models. J. Comput. Virol. Hack. Tech. (2023). https:\/\/doi.org\/10.1007\/s11416-023-00486-x","journal-title":"J. Comput. Virol. Hack. Tech."},{"key":"499_CR11","doi-asserted-by":"publisher","first-page":"e08700","DOI":"10.1016\/j.heliyon.2021.e08700","volume":"8","author":"BS Sergi","year":"2022","unstructured":"Sergi, B.S., Popkova, E.G.: Towards a \u2018wide\u2019 role for venture capital in OECD countries\u2019 industry 4.0. Heliyon 8, e08700 (2022)","journal-title":"Heliyon"},{"key":"499_CR12","doi-asserted-by":"publisher","first-page":"5788","DOI":"10.3390\/su13115788","volume":"13","author":"D Mhlanga","year":"2021","unstructured":"Mhlanga, D.: Artificial intelligence in the industry 4.0, and its impact on poverty, innovation, infrastructure development, and the sustainable development goals: Lessons from emerging economies? Sustainability 13, 5788 (2021). https:\/\/doi.org\/10.3390\/su13115788","journal-title":"Sustainability"},{"key":"499_CR13","doi-asserted-by":"publisher","first-page":"4674","DOI":"10.3390\/su12114674","volume":"12","author":"J Olah","year":"2021","unstructured":"Olah, J., Aburumman, N., Popp, J., Asif Khan, M., Haddad, H., Kitukutha, N.: Impact of industry 4.0 on environmental sustainability. Sustainability 12, 4674 (2021). https:\/\/doi.org\/10.3390\/su12114674","journal-title":"Sustainability"},{"issue":"46","key":"499_CR14","doi-asserted-by":"publisher","first-page":"9","DOI":"10.34069\/AI\/2021.46.10.1","volume":"10","author":"AS Boyar-Sozonovitch","year":"2021","unstructured":"Boyar-Sozonovitch, A.S., Buikin, A.Y., Pitelinskiy, K.V.: Features of enterprise risk management associated with operational risks. Amazonia Investiga 10(46), 9\u201319 (2021). https:\/\/doi.org\/10.34069\/AI\/2021.46.10.1","journal-title":"Amazonia Investiga"},{"key":"499_CR15","first-page":"1","volume":"86","author":"LF Macea","year":"2023","unstructured":"Macea, L.F., Serrano, I., Carcache-Guas, C.: A reservation-based parking behavioral model for parking demand management in urban areas. Socio-Econ. Sci. 86, 1\u201315 (2023)","journal-title":"Socio-Econ. Sci."},{"key":"499_CR16","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.promfg.2021.07.029","volume":"54","author":"S Hollerer","year":"2021","unstructured":"Hollerer, S., Fischer, C., Brenner, B., Papa, M., Schlund, S., Kastner, W., Fabini, J., Zseby, T.: Cobot attack: a security assessment exemplified by a specific collaborative robot. Procedia Manuf. 54, 191\u2013196 (2021)","journal-title":"Procedia Manuf."},{"key":"499_CR17","doi-asserted-by":"publisher","first-page":"2264","DOI":"10.1016\/j.procs.2023.01.202","volume":"218","author":"A Patwal","year":"2023","unstructured":"Patwal, A., Diwakar, M., Tripathi, V., Singh, P.: An investigation of videos for abnormal behavior detection. Procedia Comput. Sci. 218, 2264\u20132272 (2023)","journal-title":"Procedia Comput. Sci."},{"issue":"21","key":"499_CR18","first-page":"6","volume":"8","author":"AS Boyar-Sozonovitch","year":"2019","unstructured":"Boyar-Sozonovitch, A.S., Pitelinskiy, K.V., Ermolatiy, D.A.: Innovation economy: aspects of economic and information security in logistics innovation. Amazonia Investiga 8(21), 6\u201313 (2019)","journal-title":"Amazonia Investiga"},{"key":"499_CR19","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1186\/s42492-021-00075-z","volume":"4","author":"N Shah","year":"2021","unstructured":"Shah, N., Bhagat, N., Shah, M.: Crime forecasting: a machine learning and computer vision approach to crime prediction and prevention. Vis. Comput. Ind. Biomed. Art 4, 9 (2021). https:\/\/doi.org\/10.1186\/s42492-021-00075-z","journal-title":"Vis. Comput. Ind. Biomed. Art"},{"key":"499_CR20","doi-asserted-by":"publisher","unstructured":"Wibowo A.H., Oesman T.I.: The comparative analysis on the accuracy of k-NN, naive Bayes, and decision tree algorithms in predicting crimes and criminal actions in Sleman regency. J. Phys. Conf. Ser. 1450, 012076 (2020). https:\/\/doi.org\/10.1088\/1742-6596\/1450\/1\/012076","DOI":"10.1088\/1742-6596\/1450\/1\/012076"},{"key":"499_CR21","doi-asserted-by":"publisher","unstructured":"Hossain, S., Abtahee, A., Kashem, I., Hoque, M., Sarker, I.H.: Crime prediction using spatio-temporal data. arXiv preprint arXiv:2003.09322 (2020). https:\/\/doi.org\/10.1007\/978-981-15-6648-6_22","DOI":"10.1007\/978-981-15-6648-6_22"},{"key":"499_CR22","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.procs.2020.05.018","volume":"172","author":"SR Bandekar","year":"2020","unstructured":"Bandekar, S.R., Vijayalakshmi, C.: Design and analysis of machine learning algorithms for the reduction of crime rates in India. Procedia Comput. Sci. 172, 122\u2013127 (2020). https:\/\/doi.org\/10.1016\/j.procs.2020.05.018","journal-title":"Procedia Comput. Sci."},{"key":"499_CR23","doi-asserted-by":"publisher","first-page":"4677","DOI":"10.1007\/s00521-020-05426-0","volume":"33","author":"Y Chen","year":"2021","unstructured":"Chen, Y., Ping, Y., Zhang, Z., Wang, B., He, S.: Privacy-preserving image multi-classification deep learning model in robot system of industrial IoT. Neural Comput. Appl. 33, 4677\u20134694 (2021)","journal-title":"Neural Comput. Appl."},{"key":"499_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ces.2023.118822","volume":"276","author":"S Natsui","year":"2023","unstructured":"Natsui, S., Goto, Y., Takahashi, J.-I., Nogami, H.: Pattern analysis of the combustions of various copper concentrate tablets using high-speed microscopy and video-based deep learning. Chem. Eng. Sci. 276, 1\u201312 (2023)","journal-title":"Chem. Eng. Sci."},{"issue":"3","key":"499_CR25","first-page":"221","volume":"9","author":"S Prithi","year":"2020","unstructured":"Prithi, S., Aravindan, S., Anusuya, E., Kumar, A.M.: GUI based prediction of crime rate using machine learning approach. Int. J. Comput. Sci. Mob. Comput. 9(3), 221\u2013229 (2020)","journal-title":"Int. J. Comput. Sci. Mob. Comput."},{"key":"499_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2018.08.003","author":"M Khan","year":"2020","unstructured":"Khan, M., Tanveer, H., Sung, W.B.: Efficient CNN based summarization of surveillance videos for resource-constrained devices. Pattern Recognit. Lett. (2020). https:\/\/doi.org\/10.1016\/j.patrec.2018.08.003","journal-title":"Pattern Recognit. Lett."},{"key":"499_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.rineng.2023.101026","volume":"18","author":"M Qasim","year":"2023","unstructured":"Qasim, M., Verdu, E.: Video anomaly detection system using deep convolutional and recurrent models. Results Eng. 18, 1\u20139 (2023)","journal-title":"Results Eng."},{"key":"499_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.rineng.2022.100556","volume":"15","author":"M Asif","year":"2022","unstructured":"Asif, M., Tiwana, M.I., Khan, U.S., Ahmad, M.W., Qureshi, W.S., Iqbal, J.: Human gait recognition subject to different covariate factors in a multi-view environment. Results Eng. 15, 100556 (2022)","journal-title":"Results Eng."},{"key":"499_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2022.104467","volume":"123","author":"MQ Gandapur","year":"2022","unstructured":"Gandapur, M.Q.: E2E-VSDL: end-to-end video surveillance-based deep learning model to detect and prevent criminal activities. Image Vis. Comput. 123, 104467 (2022)","journal-title":"Image Vis. Comput."},{"issue":"15","key":"499_CR30","doi-asserted-by":"publisher","first-page":"6210","DOI":"10.3390\/su12156210","volume":"12","author":"R Socha","year":"2020","unstructured":"Socha, R., Kogut, B.: Urban video surveillance as a tool to improve security in public spaces. Sustainability 12(15), 6210 (2020)","journal-title":"Sustainability"},{"key":"499_CR31","doi-asserted-by":"crossref","unstructured":"Rezaee, K., Rezakhani, S.M., Khosravi, M.R., Moghimi, M.K.: A survey on deep learning-based real-time crowd anomaly detection for secure distributed video surveillance. Personal Ubiquitous Comput. 1\u201317 (2021)","DOI":"10.1007\/s00779-021-01586-5"},{"key":"499_CR32","doi-asserted-by":"publisher","first-page":"45343","DOI":"10.1109\/ACCESS.2020.2978247","volume":"8","author":"H Zhang","year":"2020","unstructured":"Zhang, H., Li, P., Du, Z., Dou, W.: Risk entropy modeling of surveillance camera for public security application. IEEE Access 8, 45343\u201345355 (2020)","journal-title":"IEEE Access"},{"key":"499_CR33","doi-asserted-by":"publisher","unstructured":"Yamashkina, E.O., Yamashkin, S.A., Platonova, O.V., Kovalenko, S.M.: Development of a neural network model for spatial data analysis. Russ. Technol. J. 10(5), 28\u201337 (2022). https:\/\/doi.org\/10.32362\/2500-316X-2022-10-5-28-37.","DOI":"10.32362\/2500-316X-2022-10-5-28-37"},{"key":"499_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2022.05.001","author":"S-Y Han","year":"2022","unstructured":"Han, S.-Y., Lee, H.-W.: Deep reinforcement learning based edge computing for video processing. ICT Express (2022). https:\/\/doi.org\/10.1016\/j.icte.2022.05.001","journal-title":"ICT Express"},{"key":"499_CR35","doi-asserted-by":"publisher","unstructured":"Ullah, W., Ullah, A., Hussain, T., Muhammad, K., Heidari, A.A., Del Ser, J., WookBaik, S.C., De Albuquerque, V.H.: Artificial intelligence of things-assisted two-stream neural network for anomaly detection in surveillance big video data. Future Gen. Comput. Syst. 129, 286\u2013297 (2022). https:\/\/doi.org\/10.1016\/j.future.2021.10.033","DOI":"10.1016\/j.future.2021.10.033"},{"key":"499_CR36","doi-asserted-by":"publisher","unstructured":"Blin, R., Ainouz, S., Canu, S., Meriaudeau, F.: Road scenes analysis in adverse weather conditions by polarization-encoded images and adapted deep learning. In: 2019 IEEE Intelligent Transportation Systems Conference (ITSC), 2019, pp. 27\u201332. https:\/\/doi.org\/10.1109\/ITSC.2019.8916853","DOI":"10.1109\/ITSC.2019.8916853"},{"key":"499_CR37","doi-asserted-by":"publisher","first-page":"102622","DOI":"10.1016\/j.bspc.2021.102622","volume":"68","author":"D Sharifrazi","year":"2021","unstructured":"Sharifrazi, D.: Fusion of convolution neural network, support vector machine and Sobel filter for accurate detection of COVID-19 patients using X-ray images. Biomed. Signal Process. Control 68, 102622 (2021). https:\/\/doi.org\/10.1016\/j.bspc.2021.102622","journal-title":"Biomed. Signal Process. Control"},{"key":"499_CR38","doi-asserted-by":"crossref","unstructured":"Pawar, K.B., Nalbalwar, S.L.: Distributed canny edge detection algorithm using morphological filter. In: Recent Trends in Electronics Information & Communication Technology (RTEICT) IEEE International Conference, 2016, pp. 1523\u20131527","DOI":"10.1109\/RTEICT.2016.7808087"},{"key":"499_CR39","doi-asserted-by":"publisher","unstructured":"Kumar, M.D., Babaie, M., Zhu, S., Kalra, S., Tizhoosh, H.R.: A comparative study of CNN, BoVW and LBP for classification of histopathological images. In: 2017 IEEE Symposium Series on Computational Intelligence (SSCI), 2017, pp. 1\u20137. https:\/\/doi.org\/10.1109\/SSCI.2017.8285162","DOI":"10.1109\/SSCI.2017.8285162"},{"key":"499_CR40","doi-asserted-by":"publisher","unstructured":"Deng, C.-X., Gui-Bin Wang, G.-B., Yang, X.-R.: Image edge detection algorithm based on improved Canny operator. In: 2013 International Conference on Wavelet Analysis and Pattern Recognition, 2013, pp. 168\u2013172. https:\/\/doi.org\/10.1109\/ICWAPR.2013.6599311","DOI":"10.1109\/ICWAPR.2013.6599311"},{"key":"499_CR41","unstructured":"www.kaggle.com. Cardamagedetection [\u042d\u043be\u043a\u0442po\u043d\u043d\u044b\u0439 pecypc], URL: https:\/\/www.kaggle.com\/datasets\/anujms\/car-damage-detection (\u0434a\u0442a o\u0431pa\u0449e\u043d\u0438\u044f - 03.04.2023)"},{"issue":"280","key":"499_CR42","first-page":"1","volume":"12","author":"AS Alghamdi","year":"2023","unstructured":"Alghamdi, A.S., Saeed, A., Kamran, M., Mursi, K.T., Almukadi, W.S.: Vehicle classification using deep feature fusion and genetic algorithms. Electronics 12(280), 1\u201314 (2023)","journal-title":"Electronics"},{"key":"499_CR43","doi-asserted-by":"publisher","first-page":"119108","DOI":"10.1016\/j.eswa.2022.119108","volume":"213B","author":"M Bie","year":"2023","unstructured":"Bie, M., Liu, Y., Li, G., Hong, J., Li, J.: Real-time vehicle detection algorithm based on a lightweight You-Only-Look-Once (YOLOv5n-L) approach. Expert Syst. Appl. 213B, 119108 (2023). https:\/\/doi.org\/10.1016\/j.eswa.2022.119108","journal-title":"Expert Syst. Appl."},{"key":"499_CR44","doi-asserted-by":"publisher","first-page":"05460","DOI":"10.1016\/j.compag.2020.105460","volume":"174","author":"A Soleimanipour","year":"2020","unstructured":"Soleimanipour, A., Chegini, G.R.: A vision-based hybrid approach for identification of Anthurium flower cultivars. Comput. Electron. Agric. 174, 05460 (2020)","journal-title":"Comput. Electron. Agric."},{"key":"499_CR45","doi-asserted-by":"publisher","first-page":"104893","DOI":"10.1016\/j.bspc.2023.104893","volume":"85","author":"J Chen","year":"2023","unstructured":"Chen, J., Cai, Z., Heidari, A.A., Chen, H., He, Q., Escorcia-Gutierrez, J., Romany, F.M.: Multi-threshold image segmentation based on an improved differential evolution: case study of thyroid papillary carcinoma. Biomed. Signal Process. Control 85, 104893 (2023). https:\/\/doi.org\/10.1016\/j.bspc.2023.104893","journal-title":"Biomed. Signal Process. Control"},{"key":"499_CR46","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.patrec.2022.01.006","volume":"154","author":"H Liu","year":"2022","unstructured":"Liu, H., Yang, Z., Zhang, H., Cailing, W.: Edge detection with attention: from global view to local focus. Pattern Recognit. Lett. 154, 99\u2013109 (2022). https:\/\/doi.org\/10.1016\/j.patrec.2022.01.006","journal-title":"Pattern Recognit. Lett."},{"key":"499_CR47","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1016\/j.neucom.2022.02.079","volume":"488","author":"D Yang","year":"2022","unstructured":"Yang, D., Peng, B., Al-Huda, Z., Malik, A., Zhai, D.: An overview of edge and object contour detection. Neurocomputing 488, 470\u2013493 (2022). https:\/\/doi.org\/10.1016\/j.neucom.2022.02.079","journal-title":"Neurocomputing"},{"key":"499_CR48","doi-asserted-by":"crossref","unstructured":"Poornima, E., Muthu, B., Agrawal, R., Kumar, S.P., Dhingra, M., Asaad, R.R., Jumani, A.K.: Fog robotics-based intelligence transportation system using line-of-sight intelligent transportation. Multimedia Tools Appl., 1\u201329 (2023)","DOI":"10.1007\/s11042-023-15086-6"},{"key":"499_CR49","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.jmsy.2022.05.011","volume":"63","author":"J Park","year":"2022","unstructured":"Park, J., Jun, M.B.G., Yun, H.: Development of robotic bin picking platform with cluttered objects using human guidance and convolutional neural network (CNN). J. Manuf. Syst. 63, 539\u2013549 (2022). https:\/\/doi.org\/10.1016\/j.jmsy.2022.05.011","journal-title":"J. Manuf. Syst."},{"issue":"1","key":"499_CR50","doi-asserted-by":"publisher","first-page":"e12716","DOI":"10.1016\/j.heliyon.2022.e12716","volume":"9","author":"FMT RetnoKinasih","year":"2023","unstructured":"RetnoKinasih, F.M.T., Machbub, C., Yulianti, L., Rohman, A.S.: Two-stage multiple object detection using CNN and correlative filter for accuracy improvement. Heliyon 9(1), e12716 (2023). https:\/\/doi.org\/10.1016\/j.heliyon.2022.e12716","journal-title":"Heliyon"},{"key":"499_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.dsp.2022.103397","volume":"123","author":"H Zhang","year":"2022","unstructured":"Zhang, H., Feng, L., Zhang, X., Yang, Y., Li, J.: Necessary conditions for convergence of CNNs and initialization of convolution kernels. Digit. Signal Process. 123, 1\u201312 (2022)","journal-title":"Digit. Signal Process."},{"key":"499_CR52","unstructured":"www.tensorflow.org\/. MobileNetV2 [\u042d\u043be\u043a\u0442po\u043d\u043d\u044b\u0439 pecypc]. https:\/\/www.tensorflow.org\/api_docs\/python\/tf\/keras\/applications\/mobilenet_v2\/MobileNetV2 (\u0434a\u0442a o\u0431pa\u0449e\u043d\u0438\u044f - 12.05.2023)"},{"key":"499_CR53","doi-asserted-by":"crossref","unstructured":"Shamrat, F.M.J.M., Azam, S., Karim, A., Ahmed, K., Bui, F.M., De Boer, F.: High-precision multiclass classification of lung disease through customized MobileNetV2 from chest X-ray images. Comput. Biol. Med., 155, 1\u201314 (2023)","DOI":"10.1016\/j.compbiomed.2023.106646"},{"key":"499_CR54","unstructured":"www.tensorflow.org\/. ResNet50 [\u042d\u043be\u043a\u0442po\u043d\u043d\u044b\u0439 pecypc], URL:https:\/\/www.tensorflow.org\/api_docs\/python\/tf\/keras\/applications\/resnet50\/ResNet50 (\u0434a\u0442a o\u0431pa\u0449e\u043d\u0438\u044f - 12.05.2023)"},{"key":"499_CR55","doi-asserted-by":"crossref","unstructured":"Md. Hossain, U., Md. Rahman, A., Md. Manowarul, I., Akhter A., Md. Uddin, A., Bikash Kumar, P.: Automatic driver distraction detection using deep convolutional neural networks. Intell. Syst. Appl. 14, 1\u201312 (2022)","DOI":"10.1016\/j.iswa.2022.200075"},{"key":"499_CR56","unstructured":"www.tensorflow.org\/. DenseNet121 [\u042d\u043be\u043a\u0442po\u043d\u043d\u044b\u0439 pecypc]. https:\/\/www.tensorflow.org\/api_docs\/python\/tf\/keras\/applications\/densenet\/DenseNet121(\u0434a\u0442a o\u0431pa\u0449e\u043d\u0438\u044f - 12.05.2023)"},{"key":"499_CR57","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/j.aej.2023.01.048","volume":"68","author":"M SalamaW","year":"2023","unstructured":"SalamaW, M., Aly, M.H., Abouelseoud, Y.: Deep learning-based spam image filtering. Alex. Eng. J. 68, 461\u2013468 (2023)","journal-title":"Alex. Eng. J."},{"issue":"6","key":"499_CR58","first-page":"3366","volume":"3","author":"B Sai","year":"2021","unstructured":"Sai, B., Yalla, L., Kaushik, P.: Face mask detection in images using Haar cascade classifier. Int. Res. J. Mod. Eng. Technol. Sci. 3(6), 3366\u20133372 (2021)","journal-title":"Int. Res. J. Mod. Eng. Technol. Sci."},{"key":"499_CR59","doi-asserted-by":"publisher","first-page":"2420","DOI":"10.3390\/su14042420","volume":"14","author":"A Osipov","year":"2022","unstructured":"Osipov, A., Pleshakova, E., Gataullin, S., Korchagin, S., Ivanov, M., Finogeev, A., Yadav, V.: Deep learning method for recognition and classification of images from video recorders in difficult weather conditions. Sustainability 14, 2420 (2022). https:\/\/doi.org\/10.3390\/su14042420","journal-title":"Sustainability"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00499-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00499-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00499-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T10:09:22Z","timestamp":1736417362000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00499-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,2]]},"references-count":59,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["499"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00499-6","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,2]]},"assertion":[{"value":"30 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}