{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:45:10Z","timestamp":1769751910381,"version":"3.49.0"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,2,2]],"date-time":"2022-02-02T00:00:00Z","timestamp":1643760000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,2,2]],"date-time":"2022-02-02T00:00:00Z","timestamp":1643760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Scientific and Technological Innovation Leading Plan of High-tech Industry of Hunan Province","award":["2020GK2021"],"award-info":[{"award-number":["2020GK2021"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902434"],"award-info":[{"award-number":["61902434"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004761","name":"Natural Science Foundation of Hunan Province, China","doi-asserted-by":"crossref","award":["2019JJ50826"],"award-info":[{"award-number":["2019JJ50826"]}],"id":[{"id":"10.13039\/501100004761","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2022,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Recently, convolutional neural networks have shown good performance in many counterfeit detection tasks. However, accurate counterfeit detection is still challenging due to the following three issues: (1) fine-grained classification, (2) class imbalance, and (3) high imitation samples. To address these issues, we propose a hybrid attention network (HANet) for counterfeit luxury handbag detection. In HANet, a hybrid attention module is first designed. Compared with existing methods that directly use classic CNNs for counterfeit detection, the HA module jointly uses a channel attention unit and a spatial attention unit to learn important information on both the channel and spatial dimensions. The HA modules can be easily integrated into the ResNet architecture to enhance the discriminative representation ability of CNNs, so as to help the network find subtle differences between the real and counterfeit products. In addition, an appraiser-guided loss is proposed to train HANet. Considering the factor of class imbalance and high imitation samples, the proposed loss gives the counterfeit class a higher weighting, and meanwhile gives the high imitation samples a much higher weighting. The proposed loss introduces the knowledge of appraisers, which allows HANet to not only treat real and counterfeit samples relatively fairly, but also pay more attention to the learning of difficult samples. To evaluate the performance of our method, we have constructed a well-benchmarked luxury handbag dataset. On this dataset, the performance of HANet, ResNet50, and the state-of-the-art attention methods is compared. The results demonstrate that HANet achieve superior performance against all its competitors.<\/jats:p>","DOI":"10.1007\/s40747-021-00633-1","type":"journal-article","created":{"date-parts":[[2022,2,2]],"date-time":"2022-02-02T03:02:41Z","timestamp":1643770961000},"page":"2371-2381","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Hybrid attention network with appraiser-guided loss for counterfeit luxury handbag detection"],"prefix":"10.1007","volume":"8","author":[{"given":"Jianbiao","family":"Peng","sequence":"first","affiliation":[]},{"given":"Beiji","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Xiaoyu","family":"He","sequence":"additional","affiliation":[]},{"given":"Chengzhang","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,2]]},"reference":[{"issue":"2","key":"633_CR1","first-page":"38","volume":"6","author":"M Maaz","year":"2020","unstructured":"Maaz M, Ali T (2020) How counterfeits goods are destroying brand reputation. J Eng Econ Dev 6(2):38\u201349","journal-title":"J Eng Econ Dev"},{"issue":"3","key":"633_CR2","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s10610-019-09414-6","volume":"26","author":"GA Antonopoulos","year":"2020","unstructured":"Antonopoulos GA, Hall A, Large J, Shen A (2020) Counterfeit goods fraud: an account of its financial management. Eur J Crim Policy Res 26(3):357\u2013378","journal-title":"Eur J Crim Policy Res"},{"key":"633_CR3","unstructured":"EUIPO OECD (2019) Trends in trade in counterfeit and pirated goods: illicit trade"},{"issue":"5","key":"633_CR4","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1016\/j.jbusres.2011.03.008","volume":"65","author":"T Staake","year":"2012","unstructured":"Staake T, Thiesse F, Fleisch E (2012) Business strategies in the counterfeit market. J Bus Res 65(5):658\u2013665","journal-title":"J Bus Res"},{"key":"633_CR5","doi-asserted-by":"crossref","unstructured":"Chaudhry P, Zimmerman A (2013) The global growth of counterfeit trade. In: Protecting your intellectual property rights. Springer, pp 7\u201331","DOI":"10.1007\/978-1-4614-5568-4_2"},{"issue":"4","key":"633_CR6","doi-asserted-by":"publisher","first-page":"76","DOI":"10.5539\/ijms.v9n4p76","volume":"9","author":"S Kalyoncuoglu","year":"2017","unstructured":"Kalyoncuoglu S, Sahin B et al (2017) Moderating role of materialism in the effect of perceived value on purchase intention of counterfeits of luxury brands. Int J Mark Stud 9(4):76\u201388","journal-title":"Int J Mark Stud"},{"issue":"6","key":"633_CR7","doi-asserted-by":"publisher","first-page":"660","DOI":"10.3109\/19390211.2016.1144231","volume":"13","author":"F ElAmrawy","year":"2016","unstructured":"ElAmrawy F, ElAgouri G, Elnoweam O, Aboelazayem S, Farouk EM, Nounou MI (2016) Adulterated and counterfeit male enhancement nutraceuticals and dietary supplements pose a real threat to the management of erectile dysfunction: A global perspective. J Diet Suppl 13(6):660\u2013693","journal-title":"J Diet Suppl"},{"key":"633_CR8","first-page":"785","volume":"51","author":"D Chow","year":"2010","unstructured":"Chow D (2010) Counterfeiting as an externality imposed by multinational companies on developing countries. Va J Int Law 51:785","journal-title":"Va J Int Law"},{"key":"633_CR9","doi-asserted-by":"crossref","unstructured":"Kangaspunta K, Musumeci M (2013) Trafficking in counterfeit goods. In: Handbook of transnational crime and justice, p 101","DOI":"10.4135\/9781452281995.n7"},{"issue":"3","key":"633_CR10","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1287\/msom.2015.0524","volume":"17","author":"S-H Cho","year":"2015","unstructured":"Cho S-H, Fang X, Tayur S (2015) Combating strategic counterfeiters in licit and illicit supply chains. Manuf Serv Oper Manag 17(3):273\u2013289","journal-title":"Manuf Serv Oper Manag"},{"issue":"1","key":"633_CR11","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.cis.2011.01.004","volume":"163","author":"YH Ngo","year":"2011","unstructured":"Ngo YH, Li D, Simon GP, Garnier G (2011) Paper surfaces functionalized by nanoparticles. Adv Colloid Interface Sci 163(1):23\u201338","journal-title":"Adv Colloid Interface Sci"},{"key":"633_CR12","doi-asserted-by":"crossref","unstructured":"Sharma A, Subramanian L, Brewer EA (2011) Paperspeckle: microscopic fingerprinting of paper. In: Proceedings of the 18th ACM conference on Computer and communications security, pp 99\u2013110","DOI":"10.1145\/2046707.2046721"},{"issue":"6","key":"633_CR13","doi-asserted-by":"publisher","first-page":"538","DOI":"10.2307\/1111146","volume":"21","author":"Z Chafee","year":"1921","unstructured":"Chafee Z (1921) The reacquisition of a negotiable instrument by a prior party. Columbia Law Rev 21(6):538\u2013553","journal-title":"Columbia Law Rev"},{"issue":"10","key":"633_CR14","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1590\/S1806-92902015001000001","volume":"44","author":"M Soares","year":"2015","unstructured":"Soares M, Fracalossi DM, de Freitas LEL, Rodrigues MS, Redig JC, Mouri\u00f1o JLP, Seiffert WQ, do Nascimento Vieira F (2015) Woven label; weave label; woven & printed labels; waterproof fabric mark. Revista Brasileira de Zootecnia 44(10):343\u2013349","journal-title":"Revista Brasileira de Zootecnia"},{"key":"633_CR15","doi-asserted-by":"crossref","unstructured":"van Renesse RL (2000) Synergistic combination of document security techniques. In: Optical security and counterfeit deterrence techniques III, vol 3973. International Society for Optics and Photonics, pp 126\u2013138","DOI":"10.1117\/12.382208"},{"key":"633_CR16","unstructured":"Gradinarova G, Janyan A (2011) Motor simulation and verbal association in idiom-idiom verification: effects of imageability. In: Proceedings of the annual meeting of the cognitive science society, vol 33"},{"key":"633_CR17","doi-asserted-by":"publisher","first-page":"142926","DOI":"10.1109\/ACCESS.2019.2944838","volume":"7","author":"J Miao","year":"2019","unstructured":"Miao J, Ding X, Zhou S, Gui C (2019) Fabrication of dynamic holograms on polymer surface by direct laser writing for high-security anti-counterfeit applications. IEEE Access 7:142926\u2013142933","journal-title":"IEEE Access"},{"key":"633_CR18","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.trac.2016.08.003","volume":"83","author":"J Gooch","year":"2016","unstructured":"Gooch J, Daniel B, Abbate V, Frascione N (2016) Taggant materials in forensic science: a review. TrAC Trends Anal Chem 83:49\u201354","journal-title":"TrAC Trends Anal Chem"},{"key":"633_CR19","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"633_CR20","doi-asserted-by":"crossref","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2016) Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2818\u20132826","DOI":"10.1109\/CVPR.2016.308"},{"key":"633_CR21","doi-asserted-by":"crossref","unstructured":"Huang G, Liu Z, Van Der Maaten L, Weinberger KQ (2017) Densely connected convolutional networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 4700\u20134708","DOI":"10.1109\/CVPR.2017.243"},{"issue":"7639","key":"633_CR22","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1038\/nature21056","volume":"542","author":"A Esteva","year":"2017","unstructured":"Esteva A, Kuprel B, Novoa RA, Ko J, Swetter SM, Blau HM, Thrun S (2017) Dermatologist-level classification of skin cancer with deep neural networks. Nature 542(7639):115\u2013118","journal-title":"Nature"},{"key":"633_CR23","doi-asserted-by":"crossref","unstructured":"Zhang Y, Li Z, Jiao P, Zhu S (2021) Two-stage stochastic programming approach for limited medical reserves allocation under uncertainties. Complex Intell Syst 1\u201311","DOI":"10.1007\/s40747-021-00495-7"},{"key":"633_CR24","doi-asserted-by":"crossref","unstructured":"Li S, Liu B, Li S, Zhu X, Yan Y, Zhang D (2021) A deep learning-based computer-aided diagnosis method of x-ray images for bone age assessment. Complex Intell Syst 1\u201311","DOI":"10.1007\/s40747-021-00376-z"},{"key":"633_CR25","doi-asserted-by":"crossref","unstructured":"Naresh KS, Singal G, Sirikonda S, Nethravathi R (2020) A novel approach for detection of counterfeit Indian currency notes using deep convolutional neural network. In: IOP conference series: materials science and engineering, vol 981. IOP Publishing, p 022018","DOI":"10.1088\/1757-899X\/981\/2\/022018"},{"key":"633_CR26","doi-asserted-by":"crossref","unstructured":"Hoang V-D, Vo H-Th (2018) Hybrid discriminative models for banknote recognition and anti-counterfeit. In: 2018 5th NAFOSTED conference on information and computer science (NICS). IEEE, pp 394\u2013399","DOI":"10.1109\/NICS.2018.8606900"},{"key":"633_CR27","doi-asserted-by":"crossref","unstructured":"Ishiyama R, Takahashi T, Makino K, Kudo Y, Kooper M, Abbink D (2019) Medicine tablet authentication using fingerprints of ink-jet printed characters. In: 2019 IEEE international conference on industrial technology (ICIT). IEEE, pp 871\u2013876","DOI":"10.1109\/ICIT.2019.8754966"},{"key":"633_CR28","doi-asserted-by":"crossref","unstructured":"Alsallal M, Sharif MS, Al-Ghzawi B, al Mutoki SMM (2018) A machine learning technique to detect counterfeit medicine based on x-ray fluorescence analyser. In: 2018 international conference on computing, electronics & communications engineering (iCCECE). IEEE, pp 118\u2013122","DOI":"10.1109\/iCCECOME.2018.8659110"},{"key":"633_CR29","doi-asserted-by":"crossref","unstructured":"Sharma A, Srinivasan V, Kanchan V, Subramanian L (2017) The fake vs real goods problem: microscopy and machine learning to the rescue. In: Proceedings of the 23rd ACM sigkdd international conference on knowledge discovery and data mining, pp 2011\u20132019","DOI":"10.1145\/3097983.3098186"},{"key":"633_CR30","unstructured":"\u015eerban A, Ila\u015f G, Poru\u015fniuc G-C (2020) Spotthefake: an initial report on a new cnn-enhanced platform for counterfeit goods detection. arXiv:2002.06735"},{"key":"633_CR31","doi-asserted-by":"crossref","unstructured":"Desai S, Rajadhyaksha A, Shetty A, Gharat S (2021) Cnn based counterfeit Indian currency recognition using generative adversarial network. In: 2021 International conference on artificial intelligence and smart systems (ICAIS). IEEE, pp 626\u2013631","DOI":"10.1109\/ICAIS50930.2021.9395949"},{"key":"633_CR32","doi-asserted-by":"crossref","unstructured":"Kamble K, Bhansali A, Satalgaonkar P, Alagundgi S (2019) Counterfeit currency detection using deep convolutional neural network. In: 2019 IEEE Pune section international conference (PuneCon). IEEE, pp 1\u20134","DOI":"10.1109\/PuneCon46936.2019.9105683"},{"key":"633_CR33","doi-asserted-by":"crossref","unstructured":"Rahmad C, Rohadi E, Lusiana RA (2021) Authenticity of money using the method knn (k-nearest neighbor) and cnn (convolutional neural network). In: IOP conference series: materials science and engineering, vol 1073. IOP Publishing, p 012029","DOI":"10.1088\/1757-899X\/1073\/1\/012029"},{"key":"633_CR34","first-page":"3195","volume":"9","author":"A-B Zheng","year":"2020","unstructured":"Zheng A-B, Yang H-H, Pan X-P, Yin L-H, Feng Y-C (2020) On-site identification of counterfeit drugs based on near-infrared spectroscopy Siamese-network modeling. IEEE Access 9:3195\u20133206","journal-title":"IEEE Access"},{"key":"633_CR35","unstructured":"Mishra AK, Essop MH (2019) Low-cost spectrogram based counterfeit medicine detection. arXiv:1904.07152"},{"key":"633_CR36","doi-asserted-by":"crossref","unstructured":"Ferdosi BJ, Sakib MA, Islam MS, Dhar J (2021) Identifying counterfeit medicine in bangladesh using deep learning. In: International conference on human-centered intelligent systems. Springer, pp 46\u201355","DOI":"10.1007\/978-981-16-3264-8_5"},{"key":"633_CR37","doi-asserted-by":"crossref","unstructured":"Wang Y, Huang M, Zhu X, Zhao L (2016) Attention-based lstm for aspect-level sentiment classification. In: Proceedings of the 2016 conference on empirical methods in natural language processing, pp 606\u2013615","DOI":"10.18653\/v1\/D16-1058"},{"key":"633_CR38","doi-asserted-by":"crossref","unstructured":"Zhou X, Wan X, Xiao J (2016) Attention-based lstm network for cross-lingual sentiment classification. In: Proceedings of the 2016 conference on empirical methods in natural language processing, pp 247\u2013256","DOI":"10.18653\/v1\/D16-1024"},{"key":"633_CR39","unstructured":"Xiao T, Xu Y, Yang K, Zhang J, Peng Y, Zhang Z (2015) The application of two-level attention models in deep convolutional neural network for fine-grained image classification. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 842\u2013850"},{"issue":"10","key":"633_CR40","doi-asserted-by":"publisher","first-page":"8065","DOI":"10.1109\/TGRS.2019.2918080","volume":"57","author":"JM Haut","year":"2019","unstructured":"Haut JM, Paoletti ME, Plaza J, Plaza A, Li J (2019) Visual attention-driven hyperspectral image classification. IEEE Trans Geosci Remote Sens 57(10):8065\u20138080","journal-title":"IEEE Trans Geosci Remote Sens"},{"key":"633_CR41","doi-asserted-by":"crossref","unstructured":"Wang F, Jiang M, Qian C, Yang S, Li C, Zhang H, Wang X, Tang X (2017) Residual attention network for image classification. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 3156\u20133164","DOI":"10.1109\/CVPR.2017.683"},{"key":"633_CR42","doi-asserted-by":"crossref","unstructured":"Hu J, Shen L, Sun G (2018) Squeeze-and-excitation networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 7132\u20137141","DOI":"10.1109\/CVPR.2018.00745"},{"key":"633_CR43","doi-asserted-by":"crossref","unstructured":"Zheng H, Fu J, Mei T, Luo J (2017) Learning multi-attention convolutional neural network for fine-grained image recognition. In: Proceedings of the IEEE international conference on computer vision, pp 5209\u20135217","DOI":"10.1109\/ICCV.2017.557"},{"issue":"3","key":"633_CR44","doi-asserted-by":"publisher","first-page":"1487","DOI":"10.1109\/TIP.2017.2774041","volume":"27","author":"Y Peng","year":"2017","unstructured":"Peng Y, He X, Zhao J (2017) Object-part attention model for fine-grained image classification. IEEE Trans Image Process 27(3):1487\u20131500","journal-title":"IEEE Trans Image Process"},{"issue":"9","key":"633_CR45","doi-asserted-by":"publisher","first-page":"2092","DOI":"10.1109\/TMI.2019.2893944","volume":"38","author":"J Zhang","year":"2019","unstructured":"Zhang J, Xie Y, Xia Y, Shen C (2019) Attention residual learning for skin lesion classification. IEEE Trans Med Imaging 38(9):2092\u20132103","journal-title":"IEEE Trans Med Imaging"},{"key":"633_CR46","doi-asserted-by":"crossref","unstructured":"Huynh D, Elhamifar E (2020) Fine-grained generalized zero-shot learning via dense attribute-based attention. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 4483\u20134493","DOI":"10.1109\/CVPR42600.2020.00454"},{"key":"633_CR47","doi-asserted-by":"crossref","unstructured":"Woo S, Park J, Lee J-Y, Kweon S (2018) Cbam: convolutional block attention module. In: Proceedings of the European conference on computer vision (ECCV), pp 3\u201319","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"633_CR48","doi-asserted-by":"crossref","unstructured":"Fu J, Liu J, Tian H, Li Y, Bao Y, Fang Z, Lu H (2019) Dual attention network for scene segmentation. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 3146\u20133154","DOI":"10.1109\/CVPR.2019.00326"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00633-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-021-00633-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00633-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T01:24:45Z","timestamp":1653873885000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-021-00633-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,2]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["633"],"URL":"https:\/\/doi.org\/10.1007\/s40747-021-00633-1","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,2]]},"assertion":[{"value":"26 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 December 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}