{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T11:59:21Z","timestamp":1778155161370,"version":"3.51.4"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,4,20]],"date-time":"2024-04-20T00:00:00Z","timestamp":1713571200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,20]],"date-time":"2024-04-20T00:00:00Z","timestamp":1713571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program","doi-asserted-by":"crossref","award":["2022YFB2804402"],"award-info":[{"award-number":["2022YFB2804402"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s12083-024-01682-2","type":"journal-article","created":{"date-parts":[[2024,4,21]],"date-time":"2024-04-21T02:38:00Z","timestamp":1713667080000},"page":"2123-2136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Insulator defect detection in complex scenarios based on cascaded networks with lightweight attention mechanism"],"prefix":"10.1007","volume":"17","author":[{"given":"Yang","family":"Ning","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Li","family":"Xiang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jing","family":"Hongyuan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shang","family":"Xinna","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shen","family":"Ping","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chen","family":"Aidong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,4,20]]},"reference":[{"key":"1682_CR1","doi-asserted-by":"publisher","first-page":"187965","DOI":"10.1109\/ACCESS.2020.3030658","volume":"8","author":"SK Oruganti","year":"2020","unstructured":"Oruganti SK, Khosla A, Thundat TG (2020) Wireless power-data transmission for industrial internet of things: Simulations and experiments. IEEE Access 8:187965\u2013187974","journal-title":"IEEE Access"},{"key":"1682_CR2","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.apenergy.2018.10.044","volume":"233","author":"RO Lamidi","year":"2019","unstructured":"Lamidi RO, Jiang L, Pathare PB, Wang Y, Roskilly A (2019) Recent advances in sustainable drying of agricultural produce: A review. Appl Energy 233:367\u2013385","journal-title":"Appl Energy"},{"key":"1682_CR3","doi-asserted-by":"crossref","unstructured":"Jones CB, Lave M, Vining W, Garcia BM (2021) Uncontrolled electric vehicle charging impacts on distribution electric power systems with primarily residential, commercial or industrial loads. Energies 14(6):1688","DOI":"10.3390\/en14061688"},{"key":"1682_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2021.111111","volume":"145","author":"J Shair","year":"2021","unstructured":"Shair J, Li H, Hu J, Xie X (2021) Power system stability issues classifications and research prospects in the context of high-penetration of renewables and power electronics. Renew Sust Energ Rev 145:111111","journal-title":"Renew Sust Energ Rev"},{"issue":"12","key":"1682_CR5","doi-asserted-by":"publisher","first-page":"9350","DOI":"10.1109\/TIM.2020.3031194","volume":"69","author":"L Yang","year":"2020","unstructured":"Yang L, Fan J, Liu Y, Li E, Peng J, Liang Z (2020) A review on state-of-theart power line inspection techniques. IEEE Trans Instrum Meas 69(12):9350\u20139365","journal-title":"IEEE Trans Instrum Meas"},{"issue":"4","key":"1682_CR6","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1049\/iet-cvi.2017.0327","volume":"12","author":"FS Marvasti","year":"2018","unstructured":"Marvasti FS, Mosavi MR, Nasiri M (2018) Flying small target detection in ir images based on adaptive toggle operator. IET Comput Vis 12(4):527\u2013534","journal-title":"IET Comput Vis"},{"key":"1682_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2020.102802","volume":"70","author":"M-Y Wu","year":"2020","unstructured":"Wu M-Y, Ting P-W, Tang Y-H, Chou E-T, Fu L-C (2020) Hand pose estimation in object-interaction based on deep learning for virtual reality applications. J Vis Commun Image Represent 70:102802","journal-title":"J Vis Commun Image Represent"},{"key":"1682_CR8","doi-asserted-by":"crossref","unstructured":"Sun Y, Armengol-Urpi A, Kantareddy SNR, Siegel J, Sarma S (2019) Magichand: Interact with iot devices in augmented reality environment. In: 2019 IEEE Conference on virtual reality and 3D user interfaces (VR) pp 1738\u20131743. IEEE","DOI":"10.1109\/VR.2019.8798053"},{"key":"1682_CR9","doi-asserted-by":"crossref","unstructured":"Girshick R, Donahue J, Darrell T, Malik J (2014) Rich feature hierarchies for accurate object detection and semantic segmentation. In: Proceedings of the IEEE conference on computer vision and pattern recognition pp 580\u2013587","DOI":"10.1109\/CVPR.2014.81"},{"key":"1682_CR10","doi-asserted-by":"crossref","unstructured":"Girshick R (2015) Fast r-cnn. In: Proceedings of the IEEE international conference on computer vision pp 1440\u20131448","DOI":"10.1109\/ICCV.2015.169"},{"key":"1682_CR11","unstructured":"Ren S, He K, Girshick R, Sun J (2015) Faster r-cnn: Towards real-time object detection with region proposal networks. Advances in neural information processing systems 28"},{"key":"1682_CR12","doi-asserted-by":"crossref","unstructured":"He K, Gkioxari G, Doll\u00e1r P, Girshick R (2017) Mask r-cnn. In: Proceedings of the IEEE international conference on computer vision pp 2961\u20132969","DOI":"10.1109\/ICCV.2017.322"},{"issue":"6","key":"1682_CR13","doi-asserted-by":"publisher","first-page":"3640","DOI":"10.1109\/TPWRD.2020.3046161","volume":"36","author":"N Davari","year":"2020","unstructured":"Davari N, Akbarizadeh G, Mashhour E (2020) Intelligent diagnosis of incipient fault in power distribution lines based on corona detection in uv-visible videos. IEEE Trans Power Deliv 36(6):3640\u20133648","journal-title":"IEEE Trans Power Deliv"},{"issue":"8","key":"1682_CR14","doi-asserted-by":"publisher","first-page":"2679","DOI":"10.1109\/TIM.2018.2868490","volume":"68","author":"G Kang","year":"2018","unstructured":"Kang G, Gao S, Yu L, Zhang D (2018) Deep architecture for high-speed railway insulator surface defect detection: Denoising autoencoder with multitask learning. IEEE Trans Instrum Meas 68(8):2679\u20132690","journal-title":"IEEE Trans Instrum Meas"},{"key":"1682_CR15","doi-asserted-by":"crossref","unstructured":"Liu W, Anguelov D, Erhan D, Szegedy C, Reed S, Fu C-Y, Berg AC (2016) Ssd: Single shot multibox detector. In: Computer vision\u2013ECCV 2016: 14th european conference Amsterdam The Netherlands October 11\u201314 2016, Proceedings Part I 14 pp 21\u201337. Springer","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"1682_CR16","doi-asserted-by":"crossref","unstructured":"Redmon J, Divvala S, Girshick R, Farhadi A (2016) You only look once: Unified, real-time object detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition pp 779\u2013788","DOI":"10.1109\/CVPR.2016.91"},{"key":"1682_CR17","doi-asserted-by":"crossref","unstructured":"Redmon J, Farhadi A (2017) Yolo9000: better faster stronger. In: Proceedings of the IEEE conference on computer vision and pattern recognition pp 7263\u20137271","DOI":"10.1109\/CVPR.2017.690"},{"key":"1682_CR18","unstructured":"Redmon J, Farhadi A (2018) Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767"},{"key":"1682_CR19","unstructured":"Bochkovskiy A, Wang C-Y, Liao H-YM (2020) Yolov4: Optimal speed and accuracy of object detection. arXiv preprint arXiv:2004.10934"},{"issue":"3","key":"1682_CR20","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.3390\/app12031207","volume":"12","author":"Z Qiu","year":"2022","unstructured":"Qiu Z, Zhu X, Liao C, Shi D, Qu W (2022) Detection of transmission line insulator defects based on an improved lightweight yolov4 model. Appl Sci 12(3):1207","journal-title":"Appl Sci"},{"issue":"7","key":"1682_CR21","doi-asserted-by":"publisher","first-page":"588","DOI":"10.3390\/machines10070588","volume":"10","author":"F Du","year":"2022","unstructured":"Du F, Jiao S, Chu K (2022) Research on safety detection of transmission line disaster prevention based on improved lightweight convolutional neural network. Machines 10(7):588","journal-title":"Machines"},{"key":"1682_CR22","doi-asserted-by":"crossref","unstructured":"Woo S, Park J, Lee J-Y, Kweon IS (2018) Cbam: Convolutional block attention module. In: Proceedings of the European conference on computer vision (ECCV) pp 3\u201319","DOI":"10.1007\/978-3-030-01234-2_1"},{"issue":"1","key":"1682_CR23","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MWC.2018.1700193","volume":"25","author":"N Zhang","year":"2018","unstructured":"Zhang N, Yang P, Ren J, Chen D, Yu L, Shen X (2018) Synergy of big data and 5g wireless networks: opportunities approaches and challenges. IEEE Wirel Commun 25(1):12\u201318","journal-title":"IEEE Wirel Commun"},{"issue":"1","key":"1682_CR24","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1109\/TII.2020.3045161","volume":"18","author":"D Chen","year":"2020","unstructured":"Chen D, Zhao Z, Qin X, Luo Y, Cao M, Xu H, Liu A (2020) Magleak: A learning-based side-channel attack for password recognition with multiple sensors in iiot environment. IEEE Trans Ind Informat 18(1):467\u2013476","journal-title":"IEEE Trans Ind Informat"},{"issue":"3","key":"1682_CR25","doi-asserted-by":"publisher","first-page":"5520","DOI":"10.1109\/JIOT.2019.2903245","volume":"6","author":"L Ale","year":"2019","unstructured":"Ale L, Zhang N, Wu H, Chen D, Han T (2019) Online proactive caching in mobile edge computing using bidirectional deep recurrent neural network. IEEE Internet Things J 6(3):5520\u20135530","journal-title":"IEEE Internet Things J"},{"key":"1682_CR26","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.future.2022.10.029","volume":"144","author":"H Xue","year":"2023","unstructured":"Xue H, Chen D, Zhang N, Dai H-N, Yu K (2023) Integration of blockchain and edge computing in internet of things: A survey. Futur Gener Comput Syst 144:307\u2013326","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"1682_CR27","doi-asserted-by":"publisher","first-page":"1504","DOI":"10.1109\/JIOT.2020.3012452","volume":"8","author":"Y Ding","year":"2020","unstructured":"Ding Y, Wu G, Chen D, Zhang N, Gong L, Cao M, Qin Z (2020) Deepedn: A deep-learning-based image encryption and decryption network for internet of medical things. IEEE Internet Things J 8(3):1504\u20131518","journal-title":"IEEE Internet Things J"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01682-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01682-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01682-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T18:32:49Z","timestamp":1731781969000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01682-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,20]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["1682"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01682-2","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,20]]},"assertion":[{"value":"4 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors disclosed no relevant relationships.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical standard"}},{"value":"All authors have read and agreed to the published version of the manuscript.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}]}}