{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:51:48Z","timestamp":1777657908403,"version":"3.51.4"},"reference-count":114,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100005089","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["L221026"],"award-info":[{"award-number":["L221026"]}],"id":[{"id":"10.13039\/501100005089","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005089","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["8232005"],"award-info":[{"award-number":["8232005"]}],"id":[{"id":"10.13039\/501100005089","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["41801380"],"award-info":[{"award-number":["41801380"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3510746","type":"journal-article","created":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T19:13:36Z","timestamp":1733339616000},"page":"184142-184157","source":"Crossref","is-referenced-by-count":10,"title":["A Review of Intrusion Detection for Railway Perimeter Using Deep Learning-Based Methods"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1531-0912","authenticated-orcid":false,"given":"Jin","family":"Wang","sequence":"first","affiliation":[{"name":"Beijing Key Laboratory of Traffic Engineering, Beijing University of Technology, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hongyang","family":"Zhai","sequence":"additional","affiliation":[{"name":"Beijing Engineering Research Center of Urban Transport Operation Guarantee, Beijing University of Technology, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2731-8014","authenticated-orcid":false,"given":"Yang","family":"Yang","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Traffic Engineering, Beijing University of Technology, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Niuqi","family":"Xu","sequence":"additional","affiliation":[{"name":"Beijing Engineering Research Center of Urban Transport Operation Guarantee, Beijing University of Technology, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hao","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing Engineering Research Center of Urban Transport Operation Guarantee, Beijing University of Technology, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Di","family":"Fu","sequence":"additional","affiliation":[{"name":"Beijing Engineering Research Center of Urban Transport Operation Guarantee, Beijing University of Technology, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/s24175463"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3412170"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/su151813878"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3309814"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7989-4_47"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAS.2015.7364811"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.24235\/itej.v8i2.122"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.06.016"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2881008"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0234-z"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2021.106019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/s22176563"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/BF02478259"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-011-9270-6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.21236\/ada164453"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127647"},{"key":"ref18","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NIPS)","volume":"25","author":"Krizhevsky"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2016.2598831"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2020.3030418"},{"key":"ref21","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014","journal-title":"arXiv:1409.1556"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.01.006"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.03.091"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2021.01.026"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-019-09784-7"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2765695"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3288692"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107899"},{"key":"ref31","article-title":"MobileNets: Efficient convolutional neural networks for mobile vision applications","author":"Howard","year":"2017","journal-title":"arXiv:1704.04861"},{"key":"ref32","article-title":"SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and <0.5 MB model size","author":"Iandola","year":"2016","journal-title":"arXiv:1602.07360"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3152247"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01181"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2018.03.001"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.18178\/ijmerr.6.1.22-27"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2644615"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.634"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00716"},{"key":"ref44","first-page":"6105","article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Tan"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00165"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s41095-023-0364-2"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01157"},{"key":"ref48","article-title":"Semantic image segmentation with deep convolutional nets and fully connected CRFs","author":"Chen","year":"2014","journal-title":"arXiv:1412.7062"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1511.07122"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2699184"},{"key":"ref51","article-title":"Rethinking atrous convolution for semantic image segmentation","author":"Chen","year":"2017","journal-title":"arXiv:1706.05587"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1802.02611"},{"key":"ref53","article-title":"ENet: A deep neural network architecture for real-time semantic segmentation","author":"Paszke","year":"2016","journal-title":"arXiv:1606.02147"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01261-8_20"},{"key":"ref55","article-title":"Fast-SCNN: Fast semantic segmentation network","author":"Poudel","year":"2019","journal-title":"arXiv:1902.04502"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00959"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-021-01515-2"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3228042"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01871"},{"key":"ref60","first-page":"0","article-title":"An image is worth 16 \u00d7 16 words: Transformers for image recognition at scale","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Dosovitskiy"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00681"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00717"},{"key":"ref63","article-title":"MobileViT: Light-weight, general-purpose, and mobile-friendly vision transformer","author":"Mehta","year":"2021","journal-title":"arXiv:2110.02178"},{"key":"ref64","article-title":"MobileViTv3: Mobile-friendly vision transformer with simple and effective fusion of local, global and input features","author":"Wadekar","year":"2022","journal-title":"arXiv:2209.15159"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01177"},{"key":"ref66","article-title":"SeaFormer++: Squeeze-enhanced axial transformer for mobile visual recognition","author":"Wan","year":"2023","journal-title":"arXiv:2301.13156"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i3.25411"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.81"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2389824"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2577031"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.l007\/978-3-319-46448-0_2"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01079"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00667"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01264-9_45"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58452-8_13"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11172697"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC57777.2023.10421820"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.33166\/AETiC.2020.02.005"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/s11771-016-3350-3"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.trgeo.2017.07.001"},{"key":"ref84","first-page":"521","article-title":"Image segmentation: A survey","volume-title":"Recent Advances in Mathematics, Statistics and Computer Science","author":"Pooja","year":"2015"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2883704"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2022.3220295"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3087705"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.3390\/app13010662"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2022.111277"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3366184"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2023.105069"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.101929"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122386"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00161"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1002\/int.22801"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3297728"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAS.2007.4406975"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2012.6393573"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ICIAFS.2016.7946551"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2021.109853"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2022.110728"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2019.8917091"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/CISP-BMEI51763.2020.9263662"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3156267"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2021.110564"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2023.3340688"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00460"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58548-8_24"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2022.3150584"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3070203"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3054719"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-022-1339-y"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3149789"},{"key":"ref114","article-title":"Study on nonspecific foreign matter intrusion into the range of tracks based on deep learning","author":"Xiao","year":"2023"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10777007.pdf?arnumber=10777007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T06:26:26Z","timestamp":1734071186000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10777007\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":114,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3510746","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}