{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T10:49:56Z","timestamp":1768819796084,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,8]],"date-time":"2018-12-08T00:00:00Z","timestamp":1544227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,8]]},"DOI":"10.1145\/3297156.3297199","type":"proceedings-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T13:07:04Z","timestamp":1551359224000},"page":"600-603","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["A Dangerous Goods Detection Approach Based on YOLOv3"],"prefix":"10.1145","author":[{"given":"Chenyu","family":"Xu","sequence":"first","affiliation":[{"name":"Lanzhou University, Lanzhou, Gansu"}]},{"given":"Ning","family":"Han","sequence":"additional","affiliation":[{"name":"Lanzhou University, Lanzhou, Gansu"}]},{"given":"Hongxin","family":"Li","sequence":"additional","affiliation":[{"name":"Lanzhou University, Lanzhou, Gansu"}]}],"member":"320","published-online":{"date-parts":[[2018,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017623"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/FGR.2006.61"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.81"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"e_1_3_2_1_6_1","volume-title":"YOLO9000: better, faster, stronger. arXiv preprint","author":"Redmon Joseph","year":"2017","unstructured":"Redmon , Joseph , and Ali Farhadi . YOLO9000: better, faster, stronger. arXiv preprint ( 2017 ). Redmon, Joseph, and Ali Farhadi. YOLO9000: better, faster, stronger. arXiv preprint (2017)."},{"key":"e_1_3_2_1_7_1","volume-title":"Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767","author":"Redmon Joseph","year":"2018","unstructured":"Redmon , Joseph , and Ali Farhadi . Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767 ( 2018 ). Redmon, Joseph, and Ali Farhadi. Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767 (2018)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(02)00391-2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/AIPR.2006.25"},{"key":"e_1_3_2_1_10_1","volume-title":"Intelligent System and Knowledge Engineering, 2008. ISKE 2008. 3rd International Conference on.","volume":"1","author":"Liu Dongmei","year":"2008","unstructured":"Liu , Dongmei , and Zhaoxia Wang . A united classification system of X-ray image based on fuzzy rule and neural networks . Intelligent System and Knowledge Engineering, 2008. ISKE 2008. 3rd International Conference on. Vol. 1 . IEEE, 2008 . Liu, Dongmei, and Zhaoxia Wang. A united classification system of X-ray image based on fuzzy rule and neural networks. Intelligent System and Knowledge Engineering, 2008. ISKE 2008. 3rd International Conference on. Vol. 1. IEEE, 2008."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2008.4534504"},{"key":"e_1_3_2_1_12_1","volume-title":"International Journal of Computer Science, Engineering and Information Technology 2.2","author":"Roomi M.","year":"2012","unstructured":"Roomi , M. , and R. Rajashankarii . Detection of concealed weapons in x-ray images using fuzzy k-nn . International Journal of Computer Science, Engineering and Information Technology 2.2 ( 2012 ). Roomi, M., and R. Rajashankarii. Detection of concealed weapons in x-ray images using fuzzy k-nn. International Journal of Computer Science, Engineering and Information Technology 2.2 (2012)."},{"key":"e_1_3_2_1_13_1","volume-title":"Pattern Recognition (ICPR), 2012 21st International Conference on. IEEE","author":"Schmidt-Hackenberg Ludwig","year":"2012","unstructured":"Schmidt-Hackenberg , Ludwig , Mohammad Reza Yousefi , and Thomas M . Breuel . Visual cortex inspired features for object detection in X-ray images . Pattern Recognition (ICPR), 2012 21st International Conference on. IEEE , 2012 . Schmidt-Hackenberg, Ludwig, Mohammad Reza Yousefi, and Thomas M. Breuel. Visual cortex inspired features for object detection in X-ray images. Pattern Recognition (ICPR), 2012 21st International Conference on. IEEE, 2012."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Dai Jifeng Kaiming He and Jian Sun. \"Convolutional feature masking for joint object and stuff segmentation.\" Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2015.  Dai Jifeng Kaiming He and Jian Sun. \"Convolutional feature masking for joint object and stuff segmentation.\" Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2015.","DOI":"10.1109\/CVPR.2015.7299025"},{"key":"e_1_3_2_1_16_1","volume-title":"Faster r-cnn: Towards real-time object detection with region proposal networks.\" Advances in neural information processing systems","author":"Ren Shaoqing","year":"2015","unstructured":"Ren , Shaoqing , et al. \" Faster r-cnn: Towards real-time object detection with region proposal networks.\" Advances in neural information processing systems . 2015 . Ren, Shaoqing, et al. \"Faster r-cnn: Towards real-time object detection with region proposal networks.\" Advances in neural information processing systems. 2015."}],"event":{"name":"CSAI '18: 2018 2nd International Conference on Computer Science and Artificial Intelligence","location":"Shenzhen China","acronym":"CSAI '18","sponsor":["Shenzhen University Shenzhen University"]},"container-title":["Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297156.3297199","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297156.3297199","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:09Z","timestamp":1750210749000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297156.3297199"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,8]]},"references-count":16,"alternative-id":["10.1145\/3297156.3297199","10.1145\/3297156"],"URL":"https:\/\/doi.org\/10.1145\/3297156.3297199","relation":{},"subject":[],"published":{"date-parts":[[2018,12,8]]},"assertion":[{"value":"2018-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}