{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T11:27:28Z","timestamp":1764588448216,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,17]]},"DOI":"10.1109\/infocom53939.2023.10229059","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T13:40:43Z","timestamp":1693316443000},"page":"1-10","source":"Crossref","is-referenced-by-count":7,"title":["Owl: A Pre-and Post-processing Framework for Video Analytics in Low-light Surroundings"],"prefix":"10.1109","author":[{"given":"Rui-Xiao","family":"Zhang","sequence":"first","affiliation":[{"name":"BNRist Key Laboratory of Pervasive Computing (Tsinghua University)"}]},{"given":"Chaoyang","family":"Li","sequence":"additional","affiliation":[{"name":"BNRist Key Laboratory of Pervasive Computing (Tsinghua University)"}]},{"given":"Chenglei","family":"Wu","sequence":"additional","affiliation":[{"name":"BNRist Key Laboratory of Pervasive Computing (Tsinghua University)"}]},{"given":"Tianchi","family":"Huang","sequence":"additional","affiliation":[{"name":"BNRist Key Laboratory of Pervasive Computing (Tsinghua University)"}]},{"given":"Lifeng","family":"Sun","sequence":"additional","affiliation":[{"name":"BNRist Key Laboratory of Pervasive Computing (Tsinghua University)"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1088\/1742-6596\/1883\/1\/012112"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1145\/3300061.3300116"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/AVSS.2008.65"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1145\/2809695.2809711"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/IPEC54454.2022.9777630"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1145\/2789168.2790123"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.24963\/ijcai.2021\/115"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.14778\/3137628.3137664"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"167 847","DOI":"10.1109\/ACCESS.2019.2953924","article-title":"An iterative mean filter for image denoising","volume":"7","author":"thanh","year":"2019","journal-title":"IEEE Access"},{"year":"0","article-title":"Mask-rcnn","key":"ref30"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/CVPR.2017.376"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/3453142.3491272"},{"key":"ref10","first-page":"2961","article-title":"Mask r-cnn","author":"he","year":"2017","journal-title":"Proceedings of the IEEE International Conference on Computer Vision"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1007\/978-3-030-58607-2_7"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ICCCNT45670.2019.8944469"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/3503161.3547807"},{"year":"2021","author":"alawode","article-title":"Meta-optimization of deep cnn for image denoising using lstm","key":"ref17"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/INFOCOM42981.2021.9488843"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/CVPR.2019.00181"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/SEC50012.2020.00016"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/CVPR42600.2020.00283"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/CVPR52688.2022.00564"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/3474085.3475399"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/3387514.3405874"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TIP.2019.2891888"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/3123266.3123279"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/CVPRW.2017.151"},{"key":"ref22","first-page":"252","article-title":"Fast, accurate, and lightweight super-resolution with cascading residual network","author":"ahn","year":"2018","journal-title":"Proceedings of the European Conference on Computer Vision (ECCV)"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ICCV48922.2021.00231"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/3230543.3230554"},{"key":"ref27","first-page":"740","article-title":"Microsoft coco: Common objects in context","author":"lin","year":"2014","journal-title":"European Conference on Computer Vision"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/3387514.3405887"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/INFOCOM48880.2022.9796875"},{"key":"ref7","first-page":"377","article-title":"Live video analytics at scale with approximation and {Delay-Tolerance}","author":"zhang","year":"2017","journal-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.5201\/ipol.2011.bcm_nlm"},{"year":"0","article-title":"Computer vision in retail: top 5 applications","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/s11042-017-5276-7"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/3230543.3230574"},{"key":"ref5","first-page":"40","article-title":"Smart surveillance system safeguard security company using raspberry pi","volume":"7","author":"muyambo","year":"2018","journal-title":"International Journal of Scientific and Technology Research"}],"event":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","start":{"date-parts":[[2023,5,17]]},"location":"New York City, NY, USA","end":{"date-parts":[[2023,5,20]]}},"container-title":["IEEE INFOCOM 2023 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10228851\/10228852\/10229059.pdf?arnumber=10229059","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T13:45:16Z","timestamp":1695044716000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10229059\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,17]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/infocom53939.2023.10229059","relation":{},"subject":[],"published":{"date-parts":[[2023,5,17]]}}}