{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T06:44:05Z","timestamp":1768459445726,"version":"3.49.0"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T00:00:00Z","timestamp":1683590400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T00:00:00Z","timestamp":1683590400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Kayseri University","award":["#FKB-2022-1092"],"award-info":[{"award-number":["#FKB-2022-1092"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11554-023-01311-w","type":"journal-article","created":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T01:39:36Z","timestamp":1683769176000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["RT-Droid: a novel approach for real-time android application analysis with transfer learning-based CNN models"],"prefix":"10.1007","volume":"20","author":[{"given":"Murat","family":"Tasyurek","sequence":"first","affiliation":[]},{"given":"Recep Sinan","family":"Arslan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,9]]},"reference":[{"key":"1311_CR1","unstructured":"Statcounter. Mobile operating system market share worldwide(apr 2021-apr 2022), (2022)"},{"key":"1311_CR2","unstructured":"Shishkova, T., K\u0131vya, A.: Mobile malware evolution 2021, (2022)"},{"key":"1311_CR3","unstructured":"Jovanovic, B.: A not so common cold: Malware statistics in 2022, (2022)"},{"key":"1311_CR4","doi-asserted-by":"publisher","first-page":"101663","DOI":"10.1016\/j.cose.2019.101663","volume":"89","author":"MK Alzaylaee","year":"2020","unstructured":"Alzaylaee, M.K., Yerima, S.Y., Sezer, S.: Dl-droid: Deep learning based android malware detection using real devices. Comput. Secur. 89, 101663 (2020)","journal-title":"Comput. Secur."},{"issue":"1","key":"1311_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10922-021-09634-4","volume":"30","author":"S Mahdavifar","year":"2022","unstructured":"Mahdavifar, S., Alhadidi, D., Ghorbani, A., et al.: Effective and efficient hybrid android malware classification using pseudo-label stacked auto-encoder. J. Netw. Syst. Manag. 30(1), 1\u201334 (2022)","journal-title":"J. Netw. Syst. Manag."},{"key":"1311_CR6","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/s11554-016-0573-3","volume":"16","author":"V Tripathi","year":"2019","unstructured":"Tripathi, V., Mittal, A., Gangodkar, D., Kanth, V.: Real time security framework for detecting abnormal events at atm installations. J. Real-Time Image Proc. 16, 535\u2013545 (2019)","journal-title":"J. Real-Time Image Proc."},{"key":"1311_CR7","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.imavis.2016.05.004","volume":"58","author":"P Samangouei","year":"2017","unstructured":"Samangouei, P., Patel, V.M., Chellappa, R.: Facial attributes for active authentication on mobile devices. Image Vis. Comput. 58, 181\u2013192 (2017)","journal-title":"Image Vis. Comput."},{"key":"1311_CR8","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.533","volume":"7","author":"RS Arslan","year":"2021","unstructured":"Arslan, R.S.: Androanalyzer: android malicious software detection based on deep learning. PeerJ Comput. Sci. 7, e533 (2021)","journal-title":"PeerJ Comput. Sci."},{"key":"1311_CR9","doi-asserted-by":"publisher","first-page":"124579","DOI":"10.1109\/ACCESS.2020.3006143","volume":"8","author":"K Liu","year":"2020","unstructured":"Liu, K., Shengwei, X., Guoai, X., Zhang, M., Sun, D., Liu, H.: A review of android malware detection approaches based on machine learning. IEEE Access 8, 124579\u2013124607 (2020)","journal-title":"IEEE Access"},{"key":"1311_CR10","first-page":"18","volume":"20","author":"S Venkatraman","year":"2018","unstructured":"Venkatraman, S., Alazab, M.: Use of data visualisation for zero-day malware detection. Secur. Commun. Netw. 20, 18 (2018)","journal-title":"Secur. Commun. Netw."},{"issue":"6","key":"1311_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3417978","volume":"53","author":"J Qiu","year":"2020","unstructured":"Qiu, J., Zhang, J., Luo, W., Pan, L., Nepal, S., Xiang, Y.: A survey of android malware detection with deep neural models. ACM Comput. Surv. (CSUR) 53(6), 1\u201336 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"1311_CR12","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.: Drebin: Effective and explainable detection of android malware in your pocket. In Ndss, volume\u00a014, pages 23\u201326, (2014)","DOI":"10.14722\/ndss.2014.23247"},{"issue":"7","key":"1311_CR13","doi-asserted-by":"publisher","first-page":"1290","DOI":"10.3390\/sym13071290","volume":"13","author":"L Wang","year":"2021","unstructured":"Wang, L., Gao, Y., Gao, S., Yong, X.: A new feature selection method based on a self-variant genetic algorithm applied to android malware detection. Symmetry 13(7), 1290 (2021)","journal-title":"Symmetry"},{"key":"1311_CR14","first-page":"1","volume":"2","author":"DV Nguyen","year":"2021","unstructured":"Nguyen, D.V., Nguyen, G.L., Nguyen, T.T., Ngo, A.H., Pham, G.T.: Minad: Multi-inputs neural network based on application structure for android malware detection. Peer-to-Peer Netw. Appl. 2, 1\u201315 (2021)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"1311_CR15","doi-asserted-by":"crossref","unstructured":"Yerima, S.Y., Sezer, S., Muttik, I.: Android malware detection using parallel machine learning classifiers. In 2014 Eighth international conference on next generation mobile apps, services and technologies, pages 37\u201342. IEEE, (2014)","DOI":"10.1109\/NGMAST.2014.23"},{"key":"1311_CR16","doi-asserted-by":"publisher","first-page":"101861","DOI":"10.1016\/j.sysarc.2020.101861","volume":"112","author":"J Singh","year":"2021","unstructured":"Singh, J., Singh, J.: A survey on machine learning-based malware detection in executable files. J. Syst. Architect. 112, 101861 (2021)","journal-title":"J. Syst. Architect."},{"key":"1311_CR17","doi-asserted-by":"publisher","first-page":"100373","DOI":"10.1016\/j.cosrev.2021.100373","volume":"40","author":"T Sharma","year":"2021","unstructured":"Sharma, T., Rattan, D.: Malicious application detection in android-a systematic literature review. Comput. Sci. Rev. 40, 100373 (2021)","journal-title":"Comput. Sci. Rev."},{"key":"1311_CR18","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.1007\/s11554-020-01039-x","volume":"18","author":"T Shen","year":"2021","unstructured":"Shen, T., Gao, C., Dawei, X.: The analysis of intelligent real-time image recognition technology based on mobile edge computing and deep learning. J. Real-Time Image Proc. 18, 1157\u20131166 (2021)","journal-title":"J. Real-Time Image Proc."},{"key":"1311_CR19","doi-asserted-by":"publisher","first-page":"107138","DOI":"10.1016\/j.comnet.2020.107138","volume":"171","author":"D Vasan","year":"2020","unstructured":"Vasan, D., Alazab, M., Wassan, S., Naeem, H., Safaei, B., Zheng, Q.: Imcfn: Image-based malware classification using fine-tuned convolutional neural network architecture. Comput. Netw. 171, 107138 (2020)","journal-title":"Comput. Netw."},{"key":"1311_CR20","first-page":"1","volume":"2","author":"S Saponara","year":"2021","unstructured":"Saponara, S., Elhanashi, A., Gagliardi, A.: Implementing a real-time, ai-based, people detection and social distancing measuring system for covid-19. J. Real-Time Image Process. 2, 1\u201311 (2021)","journal-title":"J. Real-Time Image Process."},{"key":"1311_CR21","doi-asserted-by":"publisher","first-page":"104159","DOI":"10.1016\/j.imavis.2021.104159","volume":"109","author":"X Liang","year":"2021","unstructured":"Liang, X., Song, Y., Zhang, W., An, Y., Wang, Y., Ning, H.: An efficient foreign objects detection network for power substation. Image Vis. Comput. 109, 104159 (2021)","journal-title":"Image Vis. Comput."},{"issue":"3","key":"1311_CR22","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/s11554-022-01201-7","volume":"19","author":"P Ding","year":"2022","unstructured":"Ding, P., Qian, H., Chu, S.: Slimyolov4: Lightweight object detector based on yolov4. J. Real-Time Image Proc. 19(3), 487\u2013498 (2022)","journal-title":"J. Real-Time Image Proc."},{"issue":"1","key":"1311_CR23","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s11554-023-01268-w","volume":"20","author":"Z Chen","year":"2023","unstructured":"Chen, Z., Zhang, F., Liu, H., Wang, L., Zhang, Q., Guo, L.: Real-time detection algorithm of helmet and reflective vest based on improved yolov5. J. Real-Time Image Proc. 20(1), 4 (2023)","journal-title":"J. Real-Time Image Proc."},{"key":"1311_CR24","doi-asserted-by":"crossref","unstructured":"Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.S.: Malware images: visualization and automatic classification. In Proceedings of the 8th international symposium on visualization for cyber security, pages 1\u20137, (2011)","DOI":"10.1145\/2016904.2016908"},{"key":"1311_CR25","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1016\/j.cose.2018.04.005","volume":"77","author":"S Ni","year":"2018","unstructured":"Ni, S., Qian, Q., Zhang, R.: Malware identification using visualization images and deep learning. Comput. Secur. 77, 871\u2013885 (2018)","journal-title":"Comput. Secur."},{"issue":"6","key":"1311_CR26","first-page":"1022","volume":"22","author":"A Bensaoud","year":"2020","unstructured":"Bensaoud, A., Abudawaood, N., Kalita, J.: Classifying malware images with convolutional neural network models. Int. J. Netw. Secur. 22(6), 1022\u20131031 (2020)","journal-title":"Int. J. Netw. Secur."},{"key":"1311_CR27","doi-asserted-by":"crossref","unstructured":"Lekssays, A., Falah, B., Abufardeh, S.: A novel approach for android malware detection and classification using convolutional neural networks. In ICSOFT, pages 606\u2013614, (2020)","DOI":"10.5220\/0009822906060614"},{"issue":"7","key":"1311_CR28","doi-asserted-by":"publisher","first-page":"1107","DOI":"10.3390\/sym13071107","volume":"13","author":"W Zhang","year":"2021","unstructured":"Zhang, W., Luktarhan, N., Ding, C., Bei, L.: Android malware detection using tcn with bytecode image. Symmetry 13(7), 1107 (2021)","journal-title":"Symmetry"},{"key":"1311_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, H., Qin, J., Zhang, B., Yan, H., Guo, J., Gao, F.: A multi-class detection system for android malicious apps based on color image features. In International Conference on Security and Privacy in New Computing Environments, pages 186\u2013206. Springer, (2020)","DOI":"10.1007\/978-3-030-66922-5_13"},{"key":"1311_CR30","doi-asserted-by":"publisher","first-page":"39680","DOI":"10.1109\/ACCESS.2021.3063748","volume":"9","author":"LN Vu","year":"2021","unstructured":"Vu, L.N., Jung, S.: Admat: A cnn-on-matrix approach to android malware detection and classification. IEEE Access 9, 39680\u201339694 (2021)","journal-title":"IEEE Access"},{"issue":"24","key":"1311_CR31","doi-asserted-by":"publisher","first-page":"7013","DOI":"10.3390\/s20247013","volume":"20","author":"J Singh","year":"2020","unstructured":"Singh, J., Thakur, D., Ali, F., Gera, T., Kwak, K.S.: Deep feature extraction and classification of android malware images. Sensors 20(24), 7013 (2020)","journal-title":"Sensors"},{"key":"1311_CR32","doi-asserted-by":"crossref","unstructured":"Kalash, M., Rochan, M., Mohammed, N., Bruce, N.D.B., Wang, Y., Iqbal, F.: Malware classification with deep convolutional neural networks. In 2018 9th IFIP international conference on new technologies, mobility and security (NTMS), pages 1\u20135. IEEE, (2018)","DOI":"10.1109\/NTMS.2018.8328749"},{"key":"1311_CR33","doi-asserted-by":"crossref","unstructured":"Kumar, R., Xiaosong, Z., Khan, R.U., Ahad, I., Kumar, J.: Malicious code detection based on image processing using deep learning. In Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, pages 81\u201385. ICCAI, (2018)","DOI":"10.1145\/3194452.3194459"},{"key":"1311_CR34","first-page":"377","volume":"47","author":"S Venkatraman","year":"2019","unstructured":"Venkatraman, S., Alazab, M., Vinayakumar, R.: A hybrid deep learning image-based analysis for effective malware detection. J. Inform. Secur. Appl. 47, 377\u2013389 (2019)","journal-title":"J. Inform. Secur. Appl."},{"key":"1311_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101748","volume":"92","author":"D Vasan","year":"2020","unstructured":"Vasan, D., Alazab, M., Wassan, S., Safaei, B., Zheng, Q.: Image-based malware classification using ensemble of cnn architectures (imcec). Comput. Secur. 92, 101748 (2020)","journal-title":"Comput. Secur."},{"key":"1311_CR36","doi-asserted-by":"crossref","unstructured":"Almomani, I., Alkhayer, A., El-Shafai, W.: An automated vision-based deep learning model for efficient detection of android malware attacks. IEEE Access, (2022)","DOI":"10.1109\/ACCESS.2022.3140341"},{"key":"1311_CR37","doi-asserted-by":"publisher","first-page":"102514","DOI":"10.1016\/j.cose.2021.102514","volume":"112","author":"K Kong","year":"2022","unstructured":"Kong, K., Zhang, Z., Yang, Z.-Y., Zhang, Z.: Fcscnn: Feature centralized siamese cnn-based android malware identification. Comput. Secur. 112, 102514 (2022)","journal-title":"Comput. Secur."},{"key":"1311_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102622","volume":"2","author":"P Yadav","year":"2022","unstructured":"Yadav, P., Menon, N., Ravi, V., Vishvanathan, S., Pham, T.D.: Efficientnet convolutional neural networks-based android malware detection. Comput. Secur. 2, 102622 (2022)","journal-title":"Comput. Secur."},{"key":"1311_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102154","volume":"105","author":"H Naeem","year":"2020","unstructured":"Naeem, H., Ullah, F., Naeem, M.R., Khalid, S., Vasan, D., Jabbar, S., Saeed, S.: Malware detection in industrial internet of things based on hybrid image visualization and deep learning model. Ad Hoc Netw. 105, 102154 (2020)","journal-title":"Ad Hoc Netw."},{"issue":"23","key":"1311_CR40","first-page":"1","volume":"34","author":"RS Arslan","year":"2020","unstructured":"Arslan, R.S., Tasy\u00fcrek, M.: Amd-cnn: Android malware detection via feature graph and convolutional neural networks. Concurr. Comput. Pract. Exp. 34(23), 1\u201319 (2020)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"1311_CR41","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/3-540-46805-6_19","volume-title":"Shape, contour and grouping in computer vision","author":"Y LeCun","year":"1999","unstructured":"LeCun, Y., Haffner, P., Bottou, L., Bengio, Y.: Object recognition with gradient-based learning. In: Shape, contour and grouping in computer vision, pp. 319\u2013345. Springer, Berlin (1999)"},{"key":"1311_CR42","unstructured":"Paul, S., Singh, L., et\u00a0al.: A review on advances in deep learning. In 2015 IEEE Workshop on Computational Intelligence: Theories, Applications and Future Directions (WCI), pages 1\u20136. IEEE, (2015)"},{"key":"1311_CR43","first-page":"2","volume":"25","author":"A Krizhevsky","year":"2012","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. Adv. Neural Inf. Process. Syst. 25, 2 (2012)","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"3","key":"1311_CR44","doi-asserted-by":"publisher","first-page":"292","DOI":"10.3390\/electronics8030292","volume":"8","author":"MZ Alom","year":"2019","unstructured":"Alom, M.Z., Taha, T.M., Yakopcic, C., Westberg, S., Sidike, P., Nasrin, M.S., Hasan, M., Van Essen, B.C., Awwal, A.A.S., Asari, V.K.: A state-of-the-art survey on deep learning theory and architectures. Electronics 8(3), 292 (2019)","journal-title":"Electronics"},{"key":"1311_CR45","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556, (2014)"},{"key":"1311_CR46","unstructured":"Samo, Z.: Object-detection-with-tensorflow-using-vgg16, (2020)"},{"key":"1311_CR47","doi-asserted-by":"crossref","unstructured":"Girshick, R., Donahue, J., Darrell, T., Malik, J.: Rich feature hierarchies for accurate object detection and semantic segmentation. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 580\u2013587, (2014)","DOI":"10.1109\/CVPR.2014.81"},{"key":"1311_CR48","doi-asserted-by":"crossref","unstructured":"Girshick, R.: Fast r-cnn. In Proceedings of the IEEE international conference on computer vision, pages 1440\u20131448, (2015)","DOI":"10.1109\/ICCV.2015.169"},{"key":"1311_CR49","first-page":"91","volume":"28","author":"S Ren","year":"2015","unstructured":"Ren, S., He, K., Girshick, R., Sun, J.: Faster r-cnn: Towards real-time object detection with region proposal networks. Adv. Neural. Inf. Process. Syst. 28, 91\u201399 (2015)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"issue":"4","key":"1311_CR50","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1007\/s00371-020-01831-7","volume":"37","author":"W Chen","year":"2021","unstructured":"Chen, W., Huang, H., Peng, S., Zhou, C., Zhang, C.: Yolo-face: a real-time face detector. Vis. Comput. 37(4), 805\u2013813 (2021)","journal-title":"Vis. Comput."},{"issue":"2","key":"1311_CR51","doi-asserted-by":"publisher","first-page":"843","DOI":"10.17341\/gazimmfd.908332","volume":"37","author":"M Ta\u015fy\u00fcrek","year":"2022","unstructured":"Ta\u015fy\u00fcrek, M., \u00d6zt\u00fcrk, C.: Ddl: \u00c7oklu kap\u0131 numaras\u0131 tespit etme ve k\u00fcmeleme i\u00e7in derin \u00f6\u011frenme tabanl\u0131 yeni bir yakla\u015f\u0131m. Gazi \u00dcniversitesi M\u00fchendislik Mimarl\u0131k Fak\u00fcltesi Dergisi 37(2), 843\u2013856 (2022)","journal-title":"Gazi \u00dcniversitesi M\u00fchendislik Mimarl\u0131k Fak\u00fcltesi Dergisi"},{"key":"1311_CR52","first-page":"2","volume":"2","author":"M Moustapha","year":"2022","unstructured":"Moustapha, M., Tasyurek, M., Ozturk, C.: A novel yolov5 deep learning model for handwriting detection and recognition. Int. J. Artif. Intellig. Tools 2, 2 (2022)","journal-title":"Int. J. Artif. Intellig. Tools"},{"key":"1311_CR53","doi-asserted-by":"crossref","unstructured":"Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You only look once: Unified, real-time object detection. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 779\u2013788, (2016)","DOI":"10.1109\/CVPR.2016.91"},{"key":"1311_CR54","doi-asserted-by":"crossref","unstructured":"Redmon, J., Farhadi, A.: Yolo9000: better, faster, stronger. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 7263\u20137271, (2017)","DOI":"10.1109\/CVPR.2017.690"},{"key":"1311_CR55","unstructured":"Redmon, J., Farhadi, A.: Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767, (2018)"},{"key":"1311_CR56","unstructured":"Bochkovskiy, A., Wang, C.-Y., Liao, H.-Y.M.: Yolov4: Optimal speed and accuracy of object detection. arXiv preprint arXiv:2004.10934, (2020)"},{"key":"1311_CR57","unstructured":"Jocher, G., Nishimura, K., Mineeva, T., Vilari\u00f1o, R.: Yolov5, 2020"},{"key":"1311_CR58","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.1016\/j.procs.2022.01.135","volume":"199","author":"P Jiang","year":"2022","unstructured":"Jiang, P., Ergu, D., Liu, F., Cai, Y., Ma, B.: A review of yolo algorithm developments. Proc. Comput. Sci. 199, 1066\u20131073 (2022)","journal-title":"Proc. Comput. Sci."},{"key":"1311_CR59","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2021.301168","volume":"37","author":"C Shweta Sharma","year":"2021","unstructured":"Shweta Sharma, C., Krishna, R., Kumar, R.: Ransomdroid: Forensic analysis and detection of android ransomware using unsupervised machine learning technique. Forens. Sci. Int. Digital Investig. 37, 301168 (2021)","journal-title":"Forens. Sci. Int. Digital Investig."},{"issue":"1","key":"1311_CR60","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/JPROC.2020.3004555","volume":"109","author":"F Zhuang","year":"2020","unstructured":"Zhuang, F., Qi, Z., Duan, K., Xi, D., Zhu, Y., Zhu, H., Xiong, H., He, Q.: A comprehensive survey on transfer learning. Proc. IEEE 109(1), 43\u201376 (2020)","journal-title":"Proc. IEEE"},{"issue":"1","key":"1311_CR61","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-016-0043-6","volume":"3","author":"K Weiss","year":"2016","unstructured":"Weiss, K., Khoshgoftaar, T.M., Wang, D.D.: A survey of transfer learning. J. Big data 3(1), 1\u201340 (2016)","journal-title":"J. Big data"},{"issue":"8","key":"1311_CR62","doi-asserted-by":"publisher","first-page":"10583","DOI":"10.1021\/acsami.0c21127","volume":"13","author":"JV Rival","year":"2021","unstructured":"Rival, J.V., Mymoona, P., Vinoth, R., Mohan, A.M.V., Shibu, E.S.: Light-emitting atomically precise nanocluster-based flexible qr codes for anticounterfeiting. ACS Appl. Mater. Interf. 13(8), 10583\u201310593 (2021)","journal-title":"ACS Appl. Mater. Interf."},{"key":"1311_CR63","doi-asserted-by":"publisher","first-page":"103405","DOI":"10.1016\/j.jvcir.2021.103405","volume":"82","author":"J-S Pan","year":"2022","unstructured":"Pan, J.-S., Liu, T., Yang, H.-M., Yan, B., Chu, S.-C., Zhu, T.: Visual cryptography scheme for secret color images with color qr codes. J. Vis. Commun. Image Represent. 82, 103405 (2022)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"1311_CR64","unstructured":"Michael, S., Florian, E., Thomas, S., Felix, C.F., Hoffmann, J.: Mobilesandbox: Looking deeper into android applications. In Proceedings of the 28th International ACM Symposium on Applied Computing (SAC), (2013)"},{"key":"1311_CR65","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: Characterization and evolution. In 2012 IEEE symposium on security and privacy, pages 95\u2013109. IEEE, (2012)","DOI":"10.1109\/SP.2012.16"},{"key":"1311_CR66","unstructured":"Minar, M.R.: Imagenet training in pytorch, (2018)"},{"key":"1311_CR67","unstructured":"Rath, S.R.: Custom object detection using pytorch faster rcnn, (2021)"},{"key":"1311_CR68","unstructured":"Yiu, W.K.: Pytorch yolov4, (2021)"},{"issue":"4","key":"1311_CR69","doi-asserted-by":"publisher","first-page":"e7542","DOI":"10.1002\/cpe.7542","volume":"35","author":"C \u00d6zt\u00fcrk","year":"2023","unstructured":"\u00d6zt\u00fcrk, C., Ta\u015fy\u00fcrek, M., T\u00fcrkdamar, M.U.: Transfer learning and fine-tuned transfer learning methods\u2019 effectiveness analyse in the cnn-based deep learning models. Concurr. Comput. Pract. Exp. 35(4), e7542 (2023)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"1311_CR70","first-page":"1","volume":"2","author":"M Ta\u015fy\u00fcrek","year":"2023","unstructured":"Ta\u015fy\u00fcrek, M.: Odrp: a new approach for spatial street sign detection from exif using deep learning-based object detection, distance estimation, rotation and projection system. Vis. Comput. 2, 1\u201321 (2023)","journal-title":"Vis. Comput."},{"key":"1311_CR71","unstructured":"Ishida, T., Yamane, I., Sakai, T., Niu, G., Sugiyama, M.: Do we need zero training loss after achieving zero training error? arXiv preprint arXiv:2002.08709, (2020)"},{"issue":"18","key":"1311_CR72","doi-asserted-by":"publisher","first-page":"3555","DOI":"10.3390\/rs13183555","volume":"13","author":"Yu Yongcan","year":"2021","unstructured":"Yongcan, Yu., Zhao, J., Gong, Q., Huang, C., Zheng, G., Ma, J.: Real-time underwater maritime object detection in side-scan sonar images based on transformer-yolov5. Remote Sens. 13(18), 3555 (2021)","journal-title":"Remote Sens."},{"issue":"14","key":"1311_CR73","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.3390\/electronics10141711","volume":"10","author":"J Yao","year":"2021","unstructured":"Yao, J., Qi, J., Zhang, J., Shao, H., Yang, J., Li, X.: A real-time detection algorithm for kiwifruit defects based on yolov5. Electronics 10(14), 1711 (2021)","journal-title":"Electronics"}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-023-01311-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11554-023-01311-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-023-01311-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T11:18:39Z","timestamp":1685791119000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11554-023-01311-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,9]]},"references-count":73,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["1311"],"URL":"https:\/\/doi.org\/10.1007\/s11554-023-01311-w","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,9]]},"assertion":[{"value":"24 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare no competing interests.\u00a0","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"55"}}