{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T10:46:09Z","timestamp":1761129969915,"version":"3.37.3"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,14]],"date-time":"2021-10-14T00:00:00Z","timestamp":1634169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,14]],"date-time":"2021-10-14T00:00:00Z","timestamp":1634169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100007128","name":"Shaanxi Provincial Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2021 SF-478"],"award-info":[{"award-number":["2021 SF-478"]}],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,14]]},"DOI":"10.1109\/iccais52680.2021.9624606","type":"proceedings-article","created":{"date-parts":[[2021,12,9]],"date-time":"2021-12-09T21:21:26Z","timestamp":1639084886000},"page":"626-631","source":"Crossref","is-referenced-by-count":9,"title":["A YOLOv5s-SE model for object detection in X-ray security images"],"prefix":"10.1109","author":[{"given":"Hong","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Automation Automatic Sorting Technology Research Center, State Post Bureau of the People&#x0027;s Republic of China Xi&#x0027;an University Of Posts and Telecommunications,Xi&#x0027;an,Shaanxi,China"}]},{"given":"Sicong","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Automation Automatic Sorting Technology Research Center, State Post Bureau of the People&#x0027;s Republic of China Xi&#x0027;an University Of Posts and Telecommunications,Xi&#x0027;an,Shaanxi,China"}]}],"member":"263","reference":[{"key":"ref10","first-page":"187","article-title":"Research on the application of Yolo algorithm in the abnormal image of security inspection [J]","volume":"56","author":"zhang","year":"2020","journal-title":"Computer Engineering and Application"},{"key":"ref11","first-page":"1","article-title":"Yolo-c: X-ray image contraband detection based on single-stage network [J\/OL]","author":"guo","year":"2021","journal-title":"Laser & Optoelectronics Progress"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6834"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00913"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00075"},{"key":"ref15","first-page":"20111","article-title":"Squeeze-and-Excitation Networks[J]","volume":"42","author":"jie","year":"2017","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"journal-title":"Enhancing Geometric Factors in Model Learning and Inference for Object Detection and Instance Segmentation[J]","year":"2020","author":"zheng","key":"ref16"},{"journal-title":"YOLOv 3 An incremental improvement[A] Computer Vision and Pattern Recognition[C]","year":"2018","author":"redmon","key":"ref4"},{"key":"ref3","first-page":"6517","author":"redmon","year":"2017","journal-title":"Yolo9000 Better faster stronger computer vision and pattern recognition"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00203"},{"journal-title":"YOLOv4 Optimal Speed and Accuracy of Object Detection","year":"2020","author":"bochkovskiy","key":"ref5"},{"key":"ref8","first-page":"147","article-title":"Real-time detection of human mask-wearing based on yolov5 network model [J]","volume":"42","author":"tan","year":"2021","journal-title":"Laser Journal"},{"key":"ref7","first-page":"1","article-title":"Surface defect detection of aero-engine components based on improved yolov4 algorithm [J\/OL]","author":"li","year":"2021","journal-title":"Laser & Optoelectronics Progress"},{"key":"ref2","first-page":"779","article-title":"You only look once: unified, real-time object detection[A]","author":"redmon","year":"2016","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition[C]"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1360\/N972016-00698"},{"key":"ref9","first-page":"1096","article-title":"Multi-scale detection of contraband in X-ray security images [J]","volume":"36","author":"zhang","year":"2020","journal-title":"Journal of Signal Processing"}],"event":{"name":"2021 International Conference on Control, Automation and Information Sciences (ICCAIS)","start":{"date-parts":[[2021,10,14]]},"location":"Xi'an, China","end":{"date-parts":[[2021,10,17]]}},"container-title":["2021 International Conference on Control, Automation and Information Sciences (ICCAIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9624464\/9624202\/09624606.pdf?arnumber=9624606","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T21:22:47Z","timestamp":1653340967000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9624606\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,14]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iccais52680.2021.9624606","relation":{},"subject":[],"published":{"date-parts":[[2021,10,14]]}}}