{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T09:53:38Z","timestamp":1769766818297,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T00:00:00Z","timestamp":1575590400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,6]]},"DOI":"10.1145\/3374587.3374621","type":"proceedings-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T18:16:31Z","timestamp":1583345791000},"page":"196-199","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Residual Mask Based on MobileNet-V2 for Driver's Dangerous Behavior Recognition"],"prefix":"10.1145","author":[{"given":"Haotian","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer Science, Hubei University of Technology, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.2174\/2212797610666170215144809"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 4510--4520)","author":"Sandler M.","unstructured":"Sandler , M. , Howard , A. , Zhu , M. , Zhmoginov , A. , and Chen , L. C . 2018. Mobilenetv2: inverted residuals and linear bottlenecks . In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 4510--4520) . Sandler, M., Howard, A., Zhu, M., Zhmoginov, A., and Chen, L. C. 2018. Mobilenetv2: inverted residuals and linear bottlenecks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 4510--4520)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"e_1_3_2_1_4_1","volume-title":"2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD) (pp. 636--641)","author":"Yan S.","unstructured":"Yan , S. , Teng , Y. , Smith , J. S. , and Zhang , B . 2016. Driver behavior recognition based on deep convolutional neural networks . In 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD) (pp. 636--641) . IEEE. Yan, S., Teng, Y., Smith, J. S., and Zhang, B. 2016. Driver behavior recognition based on deep convolutional neural networks. In 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD) (pp. 636--641). IEEE."},{"key":"e_1_3_2_1_5_1","article-title":"Facial behavior recognition for driver's fatigue detection","author":"Park H. S.","year":"2010","unstructured":"Park , H. S. , and Bae , C. S. 2010 . Facial behavior recognition for driver's fatigue detection . The Journal of Korean Institute of Communications and Information Sciences, 35(9C), 756--760. Park, H. S., and Bae, C. S. 2010. Facial behavior recognition for driver's fatigue detection. The Journal of Korean Institute of Communications and Information Sciences, 35(9C), 756--760.","journal-title":"The Journal of Korean Institute of Communications and Information Sciences, 35(9C), 756--760."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Wang P. and Liu Z. Q. 2014. Study of Driver's Gaze Behavior Recognition. Applied Mechanics and Materials 488--489 1011--1014.  Wang P. and Liu Z. Q. 2014. Study of Driver's Gaze Behavior Recognition. Applied Mechanics and Materials 488--489 1011--1014.","DOI":"10.4028\/www.scientific.net\/AMM.488-489.1011"},{"key":"e_1_3_2_1_7_1","unstructured":"Zoph B. and Le Q. V. 2016. Neural architecture search with reinforcement learning. arXiv preprint arXiv:1611.01578.  Zoph B. and Le Q. V. 2016. Neural architecture search with reinforcement learning. arXiv preprint arXiv:1611.01578."},{"key":"e_1_3_2_1_8_1","unstructured":"Han S. Mao H. and Dally W. J. 2015. A deep neural network compression pipeline: pruning quantization huffman encoding. arXiv preprint arXiv:1510.00149 10.  Han S. Mao H. and Dally W. J. 2015. A deep neural network compression pipeline: pruning quantization huffman encoding. arXiv preprint arXiv:1510.00149 10."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the European Conference on Computer Vision (ECCV) (pp. 784--800)","author":"He Y.","unstructured":"He , Y. , Lin , J. , Liu , Z. , Wang , H. , Li , L. J. , and Han , S . 2018. Amc: Automl for model compression and acceleration on mobile devices . In Proceedings of the European Conference on Computer Vision (ECCV) (pp. 784--800) . He, Y., Lin, J., Liu, Z., Wang, H., Li, L. J., and Han, S. 2018. Amc: Automl for model compression and acceleration on mobile devices. In Proceedings of the European Conference on Computer Vision (ECCV) (pp. 784--800)."},{"key":"e_1_3_2_1_10_1","volume-title":"et al","author":"Howard A. G.","year":"2017","unstructured":"Howard , A. G. , Zhu , M. , Chen , B. , Kalenichenko , D. , Wang , W. , and Weyand , T. , et al . 2017 . Mobilenets : Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861. Howard, A. G., Zhu, M., Chen, B., Kalenichenko, D., Wang, W., and Weyand, T., et al. 2017. Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 770--778)","author":"He K.","unstructured":"He , K. , Zhang , X. , Ren , S. , and Sun , J . 2015. Deep residual learning for image recognition . In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 770--778) . He, K., Zhang, X., Ren, S., and Sun, J. 2015. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 770--778)."},{"key":"e_1_3_2_1_13_1","unstructured":"Ioffe S. and Szegedy C. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167.  Ioffe S. and Szegedy C. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167."},{"key":"e_1_3_2_1_14_1","volume-title":"State Farm Distracted Driver Detection","author":"Kaggle","year":"2016","unstructured":"Kaggle competition : State Farm Distracted Driver Detection . 2016 . https:\/\/www.kaggle.com\/c\/state-farm-distracted-driver-detection\/data. Kaggle competition: State Farm Distracted Driver Detection. 2016. https:\/\/www.kaggle.com\/c\/state-farm-distracted-driver-detection\/data."},{"key":"e_1_3_2_1_15_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980.","author":"Kingma D. P","year":"2014","unstructured":"Kingma , D. P , and Ba , J . 2014 . Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980. Kingma, D. P, and Ba, J. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980."}],"event":{"name":"CSAI2019: 2019 3rd International Conference on Computer Science and Artificial Intelligence","location":"Normal IL USA","acronym":"CSAI2019","sponsor":["Shenzhen University Shenzhen University"]},"container-title":["Proceedings of the 2019 3rd International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374587.3374621","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374587.3374621","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:44Z","timestamp":1750203884000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374587.3374621"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,6]]},"references-count":15,"alternative-id":["10.1145\/3374587.3374621","10.1145\/3374587"],"URL":"https:\/\/doi.org\/10.1145\/3374587.3374621","relation":{},"subject":[],"published":{"date-parts":[[2019,12,6]]},"assertion":[{"value":"2020-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}