{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:16Z","timestamp":1750221076079,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,3]],"date-time":"2018-09-03T00:00:00Z","timestamp":1535932800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,3]]},"DOI":"10.1145\/3243394.3243703","type":"proceedings-article","created":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T12:16:08Z","timestamp":1538396168000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Correlating Belongings with Passengers in a Simulated Airport Security Checkpoint"],"prefix":"10.1145","author":[{"given":"Ashraful","family":"Islam","sequence":"first","affiliation":[{"name":"Rensselaer Polytechnic Institute, Troy, NY"}]},{"given":"Yuexi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA"}]},{"given":"Dong","family":"Yin","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA"}]},{"given":"Octavia","family":"Camps","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA"}]},{"given":"Richard J.","family":"Radke","sequence":"additional","affiliation":[{"name":"Rensselaer Polytechnic Institute, Troy, NY"}]}],"member":"320","published-online":{"date-parts":[[2018,9,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1028916.1035417"},{"volume-title":"IEEE Computer Society Conference on Computer Vision and Pattern Recognition.","year":"2017","author":"Cao Zhe","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.06.011"},{"key":"e_1_3_2_1_4_1","unstructured":"cvhciKIT. 2017. Sloth labeling tool. (Jun 2017). https:\/\/github.com\/cvhciKIT\/sloth  cvhciKIT. 2017. Sloth labeling tool. (Jun 2017). https:\/\/github.com\/cvhciKIT\/sloth"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298813"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.129"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654889"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Kevin Lin Shen-Chi Chen Chu-Song Chen Daw-Tung Lin and Yi-Ping Hung. 2015. Abandoned object detection via temporal consistency modeling and back-tracing verification for visual surveillance. IEEE Transactions on Information Forensics and Security (2015).  Kevin Lin Shen-Chi Chen Chu-Song Chen Daw-Tung Lin and Yi-Ping Hung. 2015. Abandoned object detection via temporal consistency modeling and back-tracing verification for visual surveillance. IEEE Transactions on Information Forensics and Security (2015).","DOI":"10.1109\/TIFS.2015.2408263"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"e_1_3_2_1_11_1","unstructured":"Shaoqing Ren Kaiming He Ross Girshick and Jian Sun. 2015. Faster R-CNN: Towards real-time object detection with region proposal networks. In Advances in Neural Information Processing Systems.   Shaoqing Ren Kaiming He Ross Girshick and Jian Sun. 2015. Faster R-CNN: Towards real-time object detection with region proposal networks. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2008.16"},{"key":"e_1_3_2_1_13_1","unstructured":"K. Simonyan and A. Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. CoRR abs\/1409.1556 (2014).  K. Simonyan and A. Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. CoRR abs\/1409.1556 (2014)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2009.74"},{"volume-title":"IEEE Computer Society Conference on Computer Vision and Pattern Recognition.","year":"2003","author":"Stauffer Chris","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2011.5981718"}],"event":{"name":"ICDSC '18: International Conference on Distributed Smart Cameras","acronym":"ICDSC '18","location":"Eindhoven Netherlands"},"container-title":["Proceedings of the 12th International Conference on Distributed Smart Cameras"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243394.3243703","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243394.3243703","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:32Z","timestamp":1750208252000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243394.3243703"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,3]]},"references-count":16,"alternative-id":["10.1145\/3243394.3243703","10.1145\/3243394"],"URL":"https:\/\/doi.org\/10.1145\/3243394.3243703","relation":{},"subject":[],"published":{"date-parts":[[2018,9,3]]},"assertion":[{"value":"2018-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}