{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T14:02:46Z","timestamp":1772114566950,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1109\/ciss48834.2020.1570617429","type":"proceedings-article","created":{"date-parts":[[2020,5,8]],"date-time":"2020-05-08T02:27:40Z","timestamp":1588904860000},"page":"1-6","source":"Crossref","is-referenced-by-count":38,"title":["Transfer Learning for Wildfire Identification in UAV Imagery"],"prefix":"10.1109","author":[{"given":"Haiyu","family":"Wu","sequence":"first","affiliation":[]},{"given":"Huayu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Alireza","family":"Shamsoshoara","sequence":"additional","affiliation":[]},{"given":"Abolfazl","family":"Razi","sequence":"additional","affiliation":[]},{"given":"Fatemeh","family":"Afghah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF44664.2019.9049048"},{"key":"ref11","article-title":"A solution for dynamic spectrum management in missioncritical uav networks","author":"shamsoshoara","year":"2019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICT-DM.2016.7857214"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s18030712"},{"key":"ref14","article-title":"Network in network","author":"lin","year":"2013"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"ref18","article-title":"Forest-fire-detection-through-uav-imagery-using-cnns","year":"0"},{"key":"ref19","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref28","first-page":"265","article-title":"Tensorflow: A system for largescale machine learning","author":"abadi","year":"2016","journal-title":"12th USENIX Symposium on Operating Systems Design and Implementation ( OSDI 16)"},{"key":"ref4","first-page":"748","article-title":"The use of uav&#x2019;s for search and rescue operations","volume":"192","author":"p\u00f3?ka","year":"0","journal-title":"Procedia Engineering"},{"key":"ref27","first-page":"807","article-title":"Rectified linear units improve restricted boltzmann machines","author":"nair","year":"2010","journal-title":"Proceedings of the 27th International Conference on Machine Learning (ICML-10)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/fee.1299"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2017.11"},{"key":"ref29","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/EAEEIE.2018.8534245"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845309"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2016.7440563"},{"key":"ref2","first-page":"894","article-title":"Real-time wildfire detection using correlation descriptors","author":"habiboglu","year":"2011","journal-title":"2011 19th European Signal Processing Conference"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2019.8693023"},{"key":"ref1","article-title":"National significant wildland fire potential outlook","year":"0"},{"key":"ref20","article-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications","author":"howard","year":"2017"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref21","article-title":"Efficient object detection model for real-time uav applications","author":"vaddi","year":"2019"},{"key":"ref24","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2014"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"}],"event":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","location":"Princeton, NJ, USA","start":{"date-parts":[[2020,3,18]]},"end":{"date-parts":[[2020,3,20]]}},"container-title":["2020 54th Annual Conference on Information Sciences and Systems (CISS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9081570\/9086165\/09086204.pdf?arnumber=9086204","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:46:29Z","timestamp":1656344789000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9086204\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ciss48834.2020.1570617429","relation":{},"subject":[],"published":{"date-parts":[[2020,3]]}}}