{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:17:37Z","timestamp":1730211457448,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,1,8]],"date-time":"2021-01-08T00:00:00Z","timestamp":1610064000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,8]],"date-time":"2021-01-08T00:00:00Z","timestamp":1610064000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,8]]},"DOI":"10.1109\/csp51677.2021.9357598","type":"proceedings-article","created":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T21:27:22Z","timestamp":1614288442000},"page":"205-211","source":"Crossref","is-referenced-by-count":2,"title":["License Plate Detection Using Bayesian Method Based on Edge Features"],"prefix":"10.1109","author":[{"given":"Xinyun","family":"Yan","sequence":"first","affiliation":[{"name":"College of Computer Science and Information, Hohai University,Nanjing,China,211100"}]},{"given":"Chishe","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Networks and Tele-Communications Engineering, Jinling Institute of Technology,Nanjing,China,211169"}]},{"given":"Dahui","family":"Hao","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Anhui University of Science and Technology,Huainan,China,232001"}]},{"given":"Min","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Anhui University of Science and Technology,Huainan,China,232001"}]}],"member":"263","reference":[{"key":"ref10","first-page":"5990","article-title":"A Novel Least Square and Image Rotation based Method for Solving the Inclination Problem of License Plate in Its Camera Captured Image","volume":"13","author":"wu","year":"2019","journal-title":"KSII Transactions on Internet and Information Sytsems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1515\/comp-2019-0007"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.26.3.033017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-008-0164-9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIPA.2013.6707971"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08199-4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2931791"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113280"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1088\/1755-1315\/189\/6\/062030"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2784093"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/6897345"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2859035"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2018.5151"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2015.09.009"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2017.2713806"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.01.015"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2496545"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2631901"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2015.2412146"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2222454"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.07.027"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17795-9_24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01261-8_16"}],"event":{"name":"2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP)","start":{"date-parts":[[2021,1,8]]},"location":"Zhuhai, China","end":{"date-parts":[[2021,1,10]]}},"container-title":["2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9357511\/9357565\/09357598.pdf?arnumber=9357598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,9]],"date-time":"2022-08-09T20:54:48Z","timestamp":1660078488000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9357598\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,8]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/csp51677.2021.9357598","relation":{},"subject":[],"published":{"date-parts":[[2021,1,8]]}}}