{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:55Z","timestamp":1750220755668,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,23]],"date-time":"2020-04-23T00:00:00Z","timestamp":1587600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"China National Science and Technology Major Project","award":["No. 2016ZX05057007"],"award-info":[{"award-number":["No. 2016ZX05057007"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,23]]},"DOI":"10.1145\/3404555.3404612","type":"proceedings-article","created":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T17:01:06Z","timestamp":1597942866000},"page":"240-246","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Model Compression Method of Pruning for Object Detection"],"prefix":"10.1145","author":[{"given":"Junjie","family":"Yin","sequence":"first","affiliation":[{"name":"School of Engineering Science, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Li","family":"Wei","sequence":"additional","affiliation":[{"name":"CNOOC Deepwater Development Limited, Shenzhen, China"}]},{"given":"Ding","family":"Pu","sequence":"additional","affiliation":[{"name":"CNOOC Deepwater Development Limited, Shenzhen, China"}]},{"given":"Qinghai","family":"Miao","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,8,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00963"},{"key":"e_1_3_2_1_2_1","volume-title":"V., Senior, A.","author":"Gong Y.","year":"2014","unstructured":"Gong , Y. , Liu , L. , Yang , M. , & Bourdev , L. ( 2014 ). Compressing deep convolutional networks using vector quantization. arXiv preprint arXiv:1412.6115. Vanhoucke , V., Senior, A. , & Mao, M. Z. (2011). Improving the speed of neural networks on CPUs . Gong, Y., Liu, L., Yang, M., & Bourdev, L. (2014). Compressing deep convolutional networks using vector quantization. arXiv preprint arXiv:1412.6115. Vanhoucke, V., Senior, A., & Mao, M. Z. (2011). Improving the speed of neural networks on CPUs."},{"key":"e_1_3_2_1_3_1","volume-title":"International Conference on Machine Learning (pp. 1737--1746)","author":"Gupta S.","year":"2015","unstructured":"Gupta , S. , Agrawal , A. , Gopalakrishnan , K. , & Narayanan , P. ( 2015 , June). Deep learning with limited numerical precision . In International Conference on Machine Learning (pp. 1737--1746) . 10.5555\/3045118.3045303 Gupta, S., Agrawal, A., Gopalakrishnan, K., & Narayanan, P. (2015, June). Deep learning with limited numerical precision. In International Conference on Machine Learning (pp. 1737--1746). 10.5555\/3045118.3045303"},{"key":"e_1_3_2_1_4_1","volume-title":"International journal of computer vision, 88(2), 303--338. 10.1007\/s11263-009-0275-4","author":"Everingham M.","year":"2010","unstructured":"Everingham , M. , Van Gool , L. , Williams , C. K. , Winn , J. , & Zisserman , A. ( 2010 ). The pascal visual object classes (voc) challenge . International journal of computer vision, 88(2), 303--338. 10.1007\/s11263-009-0275-4 Everingham, M., Van Gool, L., Williams, C. K., Winn, J., & Zisserman, A. (2010). The pascal visual object classes (voc) challenge. International journal of computer vision, 88(2), 303--338. 10.1007\/s11263-009-0275-4"},{"key":"e_1_3_2_1_5_1","volume-title":"Advances in neural information processing systems(pp. 2654--2662). 10.5555\/2969033.2969123","author":"Ba J.","year":"2014","unstructured":"Ba , J. , & Caruana , R. ( 2014 ). Do deep nets really need to be deep? . In Advances in neural information processing systems(pp. 2654--2662). 10.5555\/2969033.2969123 Ba, J., & Caruana, R. (2014). Do deep nets really need to be deep?. In Advances in neural information processing systems(pp. 2654--2662). 10.5555\/2969033.2969123"},{"key":"e_1_3_2_1_6_1","volume-title":"Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531","author":"Hinton G.","year":"2015","unstructured":"Hinton , G. , Vinyals , O. , & Dean , J. ( 2015 ). Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531 . Hinton, G., Vinyals, O., & Dean, J. (2015). Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531."},{"key":"e_1_3_2_1_7_1","volume-title":"European conference on computer vision (pp. 21--37)","author":"Liu W.","year":"2016","unstructured":"Liu , W. , Anguelov , D. , Erhan , D. , Szegedy , C. , Reed , S. , Fu , C. Y. , & Berg , A. C. ( 2016 , October). Ssd: Single shot multibox detector . In European conference on computer vision (pp. 21--37) . Springer, Cham.Sad Liu, W., Anguelov, D., Erhan, D., Szegedy, C., Reed, S., Fu, C. Y., & Berg, A. C. (2016, October). Ssd: Single shot multibox detector. In European conference on computer vision (pp. 21--37). Springer, Cham.Sad"},{"key":"e_1_3_2_1_8_1","first-page":"1135","volume-title":"S., Pool, J., Tran, J.","author":"Simonyan K.","year":"2014","unstructured":"Simonyan , K. , & Zisserman , A. ( 2014 ). Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv: 1409.1556.Han , S., Pool, J., Tran, J. , & Dally, W. (2015). Learning both weights and connections for efficient neural network. In Advances in neural information processing systems (pp. 1135 -- 1143 ). 10.5555\/2969239.2969366 Simonyan, K., & Zisserman, A. (2014). Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv: 1409.1556.Han, S., Pool, J., Tran, J., & Dally, W. (2015). Learning both weights and connections for efficient neural network. In Advances in neural information processing systems (pp. 1135--1143). 10.5555\/2969239.2969366"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.521"},{"key":"e_1_3_2_1_13_1","volume-title":"Improving the speed of neural networks on CPUs","author":"Vanhoucke V.","year":"2011","unstructured":"Vanhoucke , V. , Senior , A. , & Mao , M. Z. ( 2011 ). Improving the speed of neural networks on CPUs . Vanhoucke, V., Senior, A., & Mao, M. Z. (2011). Improving the speed of neural networks on CPUs."},{"key":"e_1_3_2_1_14_1","volume-title":"Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding. arXiv preprint arXiv: 1510.00149","author":"Han S.","year":"2015","unstructured":"Han , S. , Mao , H. , & Dally , W. J. ( 2015 ). Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding. arXiv preprint arXiv: 1510.00149 . Han, S., Mao, H., & Dally, W. J. (2015). Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding. arXiv preprint arXiv: 1510.00149."},{"key":"e_1_3_2_1_15_1","volume-title":"Coding and Theory. Englewood Cliffs: Prentice-Hall","author":"Hamming R. W.","year":"1980","unstructured":"Hamming , R. W. ( 1980 ). Coding and Theory. Englewood Cliffs: Prentice-Hall . Hamming, R. W. (1980). Coding and Theory. Englewood Cliffs: Prentice-Hall."},{"key":"e_1_3_2_1_16_1","volume-title":"Generalized Hessian matrix and second-order optimality conditions for problems withC 1, 1 data. Applied mathematics and optimization, 11(1), 43--56","author":"Hiriart-Urruty J. B.","year":"1984","unstructured":"Hiriart-Urruty , J. B. , Strodiot , J. J. , & Nguyen , V. H. ( 1984 ). Generalized Hessian matrix and second-order optimality conditions for problems withC 1, 1 data. Applied mathematics and optimization, 11(1), 43--56 . Hiriart-Urruty, J. B., Strodiot, J. J., & Nguyen, V. H. (1984). Generalized Hessian matrix and second-order optimality conditions for problems withC 1, 1 data. Applied mathematics and optimization, 11(1), 43--56."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015435"},{"volume-title":"ICML (Vol. 2, No. 3","author":"Liu W.","key":"e_1_3_2_1_18_1","unstructured":"Liu , W. , Wen , Y. , Yu , Z. , & Yang , M. (2016, June ). Large-margin softmax loss for convolutional neural networks . In ICML (Vol. 2, No. 3 , p. 7). 10.5555\/3045390.3045445 Liu, W., Wen, Y., Yu, Z., & Yang, M. (2016, June). Large-margin softmax loss for convolutional neural networks. In ICML (Vol. 2, No. 3, p. 7). 10.5555\/3045390.3045445"},{"key":"e_1_3_2_1_19_1","volume-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv: 1502.03167","author":"Ioffe S.","year":"2015","unstructured":"Ioffe , S. , & Szegedy , C. ( 2015 ). Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv: 1502.03167 . Ioffe, S., & Szegedy, C. (2015). Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv: 1502.03167."},{"key":"e_1_3_2_1_20_1","volume-title":"Advances in neural information processing systems (pp. 598--605). 10.5555\/109230.109298","author":"LeCun Y.","year":"1990","unstructured":"LeCun , Y. , Denker , J. S. , & Solla , S. A. ( 1990 ). Optimal brain damage . In Advances in neural information processing systems (pp. 598--605). 10.5555\/109230.109298 LeCun, Y., Denker, J. S., & Solla, S. A. (1990). Optimal brain damage. In Advances in neural information processing systems (pp. 598--605). 10.5555\/109230.109298"},{"key":"e_1_3_2_1_21_1","volume-title":"Advances in neural information processing systems (pp. 164--171). 10.5555\/645753.668069","author":"Hassibi B.","year":"1993","unstructured":"Hassibi , B. , & Stork , D. G. ( 1993 ). Second order derivatives for network pruning: Optimal brain surgeon . In Advances in neural information processing systems (pp. 164--171). 10.5555\/645753.668069 Hassibi, B., & Stork, D. G. (1993). Second order derivatives for network pruning: Optimal brain surgeon. In Advances in neural information processing systems (pp. 164--171). 10.5555\/645753.668069"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJMLC.2011.V1.18"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJMLC.2012.V2.232"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJMLC.2013.V3.273"},{"issue":"4","key":"e_1_3_2_1_25_1","first-page":"400","volume":"1","author":"Jaruwan Toontham","unstructured":"Jaruwan Toontham , Chaiyapon Thongchaisuratkrul, \" The Comparison of Object Recognition and Identification by Using Image Processing Base on the Neural Network, the Hough transform and the Harris Corner Detection,\" International Journal of Machine Learning and Computing vol. 1 , no. 4 , pp. 400 -- 404 , Jaruwan Toontham, Chaiyapon Thongchaisuratkrul, \"The Comparison of Object Recognition and Identification by Using Image Processing Base on the Neural Network, the Hough transform and the Harris Corner Detection,\" International Journal of Machine Learning and Computing vol. 1, no. 4, pp. 400--404,","journal-title":"International Journal of Machine Learning and Computing"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.18178\/ijmlc.2016.6.2.578"}],"event":{"name":"ICCAI '20: 2020 6th International Conference on Computing and Artificial Intelligence","sponsor":["University of Tsukuba University of Tsukuba"],"location":"Tianjin China","acronym":"ICCAI '20"},"container-title":["Proceedings of the 2020 6th International Conference on Computing and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404555.3404612","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3404555.3404612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:59Z","timestamp":1750199939000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404555.3404612"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,23]]},"references-count":26,"alternative-id":["10.1145\/3404555.3404612","10.1145\/3404555"],"URL":"https:\/\/doi.org\/10.1145\/3404555.3404612","relation":{},"subject":[],"published":{"date-parts":[[2020,4,23]]},"assertion":[{"value":"2020-08-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}