{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,20]],"date-time":"2026-05-20T01:45:37Z","timestamp":1779241537441,"version":"3.51.4"},"reference-count":7,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T00:00:00Z","timestamp":1730851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T00:00:00Z","timestamp":1730851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,6]]},"DOI":"10.1109\/dese63988.2024.10911959","type":"proceedings-article","created":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T17:30:50Z","timestamp":1741714250000},"page":"261-267","source":"Crossref","is-referenced-by-count":1,"title":["Assisting airport security screening through YOLO techniques and generating results using LIME interpretation"],"prefix":"10.1109","author":[{"given":"Ruchen","family":"Liu","sequence":"first","affiliation":[{"name":"Teesside University,Middlesbrough,UK"}]},{"given":"Shatha","family":"Ghareeb","sequence":"additional","affiliation":[{"name":"Teesside University,Middlesbrough,UK"}]},{"given":"Jamila","family":"Mustafina","sequence":"additional","affiliation":[{"name":"Kazan Federal University,Kazan,Russia"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Toward automatic threat recognition for airport X -ray baggage screening with deep convolutional object detection\u2019","author":"Liang","year":"2019","journal-title":"arXiv Preprint arXiv:1912.06329"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCASIT48058.2019.8973152"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70488-3_278"},{"issue":"3","key":"ref4","first-page":"37","article-title":"TSA Screening Procedures: A Threat to Privacy\u2019","volume":"7","author":"Deno","year":"2014","journal-title":"International Journal ofArts & Sciences"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(02)00391-2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.2514\/6.2020-2881"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3389\/fpls.2022.1091655"}],"event":{"name":"2024 17th International Conference on Development in eSystem Engineering (DeSE)","location":"Khorfakkan, United Arab Emirates","start":{"date-parts":[[2024,11,6]]},"end":{"date-parts":[[2024,11,8]]}},"container-title":["2024 17th International Conference on Development in eSystem Engineering (DeSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10910945\/10911883\/10911959.pdf?arnumber=10911959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T05:28:40Z","timestamp":1741757320000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10911959\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,6]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/dese63988.2024.10911959","relation":{},"subject":[],"published":{"date-parts":[[2024,11,6]]}}}