{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:34:41Z","timestamp":1773329681565,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"The GF Technology and Innovation Special Zone Program"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s11760-024-03609-z","type":"journal-article","created":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T08:01:10Z","timestamp":1733299270000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Detection of abandoned objects based on Yolov9 and background differencing"],"prefix":"10.1007","volume":"19","author":[{"given":"Huajun","family":"Song","sequence":"first","affiliation":[]},{"given":"Jinbo","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yunze","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,4]]},"reference":[{"key":"3609_CR1","doi-asserted-by":"publisher","unstructured":"Fu, H., Xiang, M., Ma, H., Ming, A., Liu, L.: Abandoned object detection in highway scene. In: 2011 6th International Conference on Pervasive Computing and Applications, pp. 117\u2013121 (2011). https:\/\/doi.org\/10.1109\/ICPCA.2011.6106489","DOI":"10.1109\/ICPCA.2011.6106489"},{"key":"3609_CR2","doi-asserted-by":"crossref","unstructured":"Wang, Y., Zhai, J.: Highway abandoned object detection based on foreground extraction. In: Chinese Intelligent Systems Conference, pp. 367\u2013376 (2023). Springer","DOI":"10.1007\/978-981-99-6847-3_31"},{"key":"3609_CR3","doi-asserted-by":"publisher","first-page":"80010","DOI":"10.1109\/ACCESS.2020.2990618","volume":"8","author":"H Park","year":"2020","unstructured":"Park, H., Park, S., Joo, Y.: Detection of abandoned and stolen objects based on dual background model and mask r-cnn. IEEE Access 8, 80010\u201380019 (2020)","journal-title":"IEEE Access"},{"key":"3609_CR4","doi-asserted-by":"crossref","unstructured":"Duan, K., Bai, S., Xie, L., Qi, H., Huang, Q., Tian, Q.: Centernet: keypoint triplets for object detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 6569\u20136578 (2019)","DOI":"10.1109\/ICCV.2019.00667"},{"issue":"5","key":"3609_CR5","doi-asserted-by":"publisher","first-page":"531","DOI":"10.3390\/rs11050531","volume":"11","author":"Y Wang","year":"2019","unstructured":"Wang, Y., Wang, C., Zhang, H., Dong, Y., Wei, S.: Automatic ship detection based on retinanet using multi-resolution gaofen-3 imagery. Remote Sens. 11(5), 531 (2019)","journal-title":"Remote Sens."},{"key":"3609_CR6","doi-asserted-by":"crossref","unstructured":"Liu, W., Anguelov, D., Erhan, D., Szegedy, C., Reed, S., Fu, C.-Y., Berg, A.C.: Ssd: single shot multibox detector. In: Computer Vision\u2013ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11\u201314, 2016, Proceedings, Part I 14, pp. 21\u201337 (2016). Springer","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"3609_CR7","doi-asserted-by":"crossref","unstructured":"Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You only look once: unified, real-time object detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 779\u2013788 (2016)","DOI":"10.1109\/CVPR.2016.91"},{"key":"3609_CR8","unstructured":"Redmon, J., Farhadi, A.: Yolov3: an incremental improvement. Preprint arXiv:1804.02767 (2018)"},{"key":"3609_CR9","doi-asserted-by":"crossref","unstructured":"Wang, C.-Y., Bochkovskiy, A., Liao, H.-Y.M.: Yolov7: trainable bag-of-freebies sets new state-of-the-art for real-time object detectors. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7464\u20137475 (2023)","DOI":"10.1109\/CVPR52729.2023.00721"},{"key":"3609_CR10","doi-asserted-by":"crossref","unstructured":"Girshick, R., Donahue, J., Darrell, T., Malik, J.: Rich feature hierarchies for accurate object detection and semantic segmentation. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 580\u2013587 (2014)","DOI":"10.1109\/CVPR.2014.81"},{"key":"3609_CR11","doi-asserted-by":"crossref","unstructured":"Girshick, R.: Fast r-cnn. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 1440\u20131448 (2015)","DOI":"10.1109\/ICCV.2015.169"},{"key":"3609_CR12","unstructured":"Ren, S., He, K., Girshick, R., Sun, J.: Faster r-cnn: towards real-time object detection with region proposal networks. Advances in neural information processing systems 28 (2015)"},{"issue":"7","key":"3609_CR13","doi-asserted-by":"publisher","first-page":"10781","DOI":"10.1007\/s11042-022-13305-0","volume":"82","author":"H Song","year":"2023","unstructured":"Song, H., Zhang, X., Song, J., Zhao, J.: Detection and tracking of safety helmet based on deepsort and yolov5. Multimed. Tools Appl. 82(7), 10781\u201310794 (2023)","journal-title":"Multimed. Tools Appl."},{"key":"3609_CR14","doi-asserted-by":"crossref","unstructured":"Cai, S., Meng, H., Yuan, M., Wu, J.: FS-YOLO: a multi-scale SAR ship detection network in complex scenes. Signal, Image and Video Processing, 1\u201311 (2024)","DOI":"10.1007\/s11760-024-03212-2"},{"key":"3609_CR15","doi-asserted-by":"crossref","unstructured":"Zivkovic, Z.: Improved adaptive gaussian mixture model for background subtraction. In: Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004., 2, 28\u201331 (2004). IEEE","DOI":"10.1109\/ICPR.2004.1333992"},{"issue":"7","key":"3609_CR16","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1016\/j.patrec.2005.11.005","volume":"27","author":"Z Zivkovic","year":"2006","unstructured":"Zivkovic, Z., Van Der Heijden, F.: Efficient adaptive density estimation per image pixel for the task of background subtraction. Pattern Recognit. Lett. 27(7), 773\u2013780 (2006)","journal-title":"Pattern Recognit. Lett."},{"key":"3609_CR17","doi-asserted-by":"crossref","unstructured":"Wang, C.-Y., Yeh, I.-H., Liao, H.-Y.M.: Yolov9: learning what you want to learn using programmable gradient information. Preprint at arXiv:2402.13616 (2024)","DOI":"10.1007\/978-3-031-72751-1_1"},{"key":"3609_CR18","doi-asserted-by":"crossref","unstructured":"Stauffer, C., Grimson, W.E.L.: Adaptive background mixture models for real-time tracking. In: Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149), 2, 246\u2013252 (1999). IEEE","DOI":"10.1109\/CVPR.1999.784637"},{"issue":"36","key":"3609_CR19","doi-asserted-by":"publisher","first-page":"5760","DOI":"10.1016\/j.vaccine.2010.06.087","volume":"28","author":"P Kudela","year":"2010","unstructured":"Kudela, P., Koller, V.J., Lubitz, W.: Bacterial ghosts (bgs)\u2013advanced antigen and drug delivery system. Vaccine 28(36), 5760\u20135767 (2010)","journal-title":"Vaccine"},{"key":"3609_CR20","unstructured":"Zhang, H., Xu, C., Zhang, S.: Inner-iou: more effective intersection over union loss with auxiliary bounding box. Preprint at arXiv:2311.02877 (2023)"},{"key":"3609_CR21","unstructured":"Siliang, M., Yong, X.: Mpdiou: a loss for efficient and accurate bounding box regression. Preprint at arXiv:2307.07662 (2023)"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03609-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-024-03609-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03609-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T17:50:23Z","timestamp":1738086623000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-024-03609-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,4]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["3609"],"URL":"https:\/\/doi.org\/10.1007\/s11760-024-03609-z","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,4]]},"assertion":[{"value":"26 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 December 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"54"}}