{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:38:24Z","timestamp":1773841104443,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,4]],"date-time":"2021-12-04T00:00:00Z","timestamp":1638576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006407","name":"Natural Science Foundation of Henan Province","doi-asserted-by":"publisher","award":["202300410092 and 202300410093"],"award-info":[{"award-number":["202300410092 and 202300410093"]}],"id":[{"id":"10.13039\/501100006407","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,4]]},"DOI":"10.1145\/3507548.3507552","type":"proceedings-article","created":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T23:12:40Z","timestamp":1646867560000},"page":"27-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["AMOD-Net: Attention-based Multi-Scale Object Detection Network for X- Ray Baggage Security Inspection"],"prefix":"10.1145","author":[{"given":"Xiaoke","family":"Zhu","sequence":"first","affiliation":[{"name":"School of Computer and Information Engineering, Henan University, China"}]},{"given":"Jitong","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Henan University, China"}]},{"given":"Xiaopan","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Henan University, China"}]},{"given":"Danyang","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Henan University, China"}]},{"given":"Yufei","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Henan University, China"}]},{"given":"Minghao","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Henan University, China"}]}],"member":"320","published-online":{"date-parts":[[2022,3,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/AIPR.2006.25"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1558607.1558630"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2014.6918699"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2017.8296499"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812196"},{"key":"e_1_3_2_1_6_1","volume-title":"CoRR","author":"Hassan T.","year":"2019","unstructured":"T. Hassan , S. H. Khan , S. Akcay , M. Bennamoun , and N. Werghi , \u201c Deep CMST framework for the autonomous recognition of heavily occluded and cluttered baggage items from multivendor security radiographs ,\u201d CoRR , 2019 . T. Hassan, S. H. Khan, S. Akcay, M. Bennamoun, and N. Werghi, \u201cDeep CMST framework for the autonomous recognition of heavily occluded and cluttered baggage items from multivendor security radiographs,\u201d CoRR, 2019."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP40778.2020.9190711"},{"key":"e_1_3_2_1_8_1","first-page":"02767","article-title":"Yolov3: An incremental improvement","volume":"1804","author":"Redmon J.","year":"2018","unstructured":"J. Redmon and A. Farhadi , \u201c Yolov3: An incremental improvement ,\u201d CoRR , vol. abs\/ 1804 . 02767 , 2018 . J. Redmon and A. Farhadi, \u201cYolov3: An incremental improvement,\u201d CoRR, vol. abs\/1804.02767, 2018.","journal-title":"CoRR"},{"key":"e_1_3_2_1_9_1","volume-title":"ECCV 2016","author":"Liu W.","year":"2016","unstructured":"W. Liu , D. Anguelov , D. Erhan , C. Szegedy , S. E. Reed , C. Fu , and A. C. Berg , \u201c SSD: single shot multi box detector,\u201d in Computer Vision - ECCV 2016 , B. Leibe, J. Matas, N. Sebe, and M. Welling, Eds. , 2016 . W. Liu, D. Anguelov, D. Erhan, C. Szegedy, S. E. Reed, C. Fu, and A. C. Berg, \u201cSSD: single shot multi box detector,\u201d in Computer Vision - ECCV 2016, B. Leibe, J. Matas, N. Sebe, and M. Welling, Eds., 2016."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"e_1_3_2_1_12_1","volume-title":"Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems2015","author":"Ren S.","unstructured":"S. Ren , K. He , R. B. Girshick , and J. Sun , \u201c Faster R-CNN: towards real- time object detection with region proposal networks ,\u201d in Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems2015 ,, C. Cortes, N. D. Lawrence , S. Ren, K. He, R. B. Girshick, and J. Sun, \u201cFaster R-CNN: towards real- time object detection with region proposal networks,\u201d in Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems2015,, C. Cortes, N. D. Lawrence,"},{"key":"e_1_3_2_1_13_1","volume-title":"Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016","author":"Lee D. D.","year":"2016","unstructured":"D. D. Lee , M. Sugiyama , and R. Garnett , Eds., 2015. J. Dai , Y. Li , K. He , and J. Sun , \u201cR-FCN: object detection via region- based fully convolutional networks ,\u201d in Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016 , Barcelona, Spain, D. D. Lee, M. Sugiyama, U. von Luxburg, I. Guyon, and R. Garnett,Eds. , 2016 . D. D. Lee, M. Sugiyama, and R. Garnett, Eds., 2015. J. Dai, Y. Li, K. He, and J. Sun, \u201cR-FCN: object detection via region- based fully convolutional networks,\u201d in Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, Barcelona, Spain, D. D. Lee, M. Sugiyama, U. von Luxburg, I. Guyon, and R. Garnett,Eds., 2016."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00091"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-021-01136-5"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2019.00262"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.2309484"},{"key":"e_1_3_2_1_18_1","first-page":"9896","volume-title":"25th International Conference on Pattern Recognition, ICPR 2020","author":"Isaac-Medina B. K. S.","year":"2020","unstructured":"B. K. S. Isaac-Medina , C. G. Willcocks , and T. P. Breckon , \u201c Multi-view object detection using epipolar constraints within cluttered x-ray security imagery ,\u201d in 25th International Conference on Pattern Recognition, ICPR 2020 . IEEE, 2020 , pp. 9889\u2013 9896 . B. K. S. Isaac-Medina, C. G. Willcocks, and T. P. Breckon, \u201cMulti-view object detection using epipolar constraints within cluttered x-ray security imagery,\u201d in 25th International Conference on Pattern Recognition, ICPR 2020. IEEE, 2020, pp. 9889\u20139896."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2017.8296499"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.18280\/ria.340415"},{"key":"e_1_3_2_1_21_1","first-page":"04251","article-title":"Deep CMST framework for the autonomous recognition of heavily occluded and cluttered baggage items from multivendor security radiographs","volume":"1912","author":"Hassan T.","year":"2019","unstructured":"T. Hassan , S. H. Khan , S. Akcay , M. Bennamoun , and N. Werghi , \u201c Deep CMST framework for the autonomous recognition of heavily occluded and cluttered baggage items from multivendor security radiographs ,\u201d CoRR , vol. abs\/ 1912 . 04251 , 2019 . T. Hassan, S. H. Khan, S. Akcay, M. Bennamoun, and N. Werghi, \u201cDeep CMST framework for the autonomous recognition of heavily occluded and cluttered baggage items from multivendor security radiographs,\u201d CoRR, vol. abs\/1912.04251, 2019.","journal-title":"CoRR"},{"key":"e_1_3_2_1_22_1","volume-title":"3rd International Conference on Learning Representations, ICLR","author":"Simonyan K.","year":"2015","unstructured":"K. Simonyan and A. Zisserman , \u201c Very deep convolutional networks for large-scale image recognition ,\u201d in 3rd International Conference on Learning Representations, ICLR 2015 , Y. Bengio and Y. LeCun, Eds. K. Simonyan and A. Zisserman, \u201cVery deep convolutional networks for large-scale image recognition,\u201d in 3rd International Conference on Learning Representations, ICLR 2015, Y. Bengio and Y. LeCun, Eds."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00972"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00644"},{"key":"e_1_3_2_1_26_1","first-page":"07020","article-title":"Towards real-world prohibited item detection: A large-scale x-ray benchmark","volume":"2108","author":"Wang B.","year":"2021","unstructured":"B. Wang , L. Zhang , L. Wen , X. Liu , and Y. Wu , \u201c Towards real-world prohibited item detection: A large-scale x-ray benchmark ,\u201d CoRR , vol. abs\/ 2108 . 07020 , 2021 . B. Wang, L. Zhang, L. Wen, X. Liu, and Y. Wu, \u201cTowards real-world prohibited item detection: A large-scale x-ray benchmark,\u201d CoRR, vol. abs\/2108.07020, 2021.","journal-title":"CoRR"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"e_1_3_2_1_28_1","first-page":"07020","article-title":"Towards real-world prohibited item detection: A large-scale x-ray benchmark","volume":"2108","author":"Wang B.","year":"2021","unstructured":"B. Wang , L. Zhang , L. Wen , X. Liu , and Y. Wu , \u201c Towards real-world prohibited item detection: A large-scale x-ray benchmark ,\u201d CoRR , vol. abs\/ 2108 . 07020 , 2021 . B. Wang, L. Zhang, L. Wen, X. Liu, and Y. Wu, \u201cTowards real-world prohibited item detection: A large-scale x-ray benchmark,\u201d CoRR, vol. abs\/2108.07020, 2021.","journal-title":"CoRR"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.193"}],"event":{"name":"CSAI 2021: 2021 5th International Conference on Computer Science and Artificial Intelligence","location":"Beijing China","acronym":"CSAI 2021"},"container-title":["2021 5th International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507548.3507552","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507548.3507552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:26Z","timestamp":1750191146000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507548.3507552"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,4]]},"references-count":29,"alternative-id":["10.1145\/3507548.3507552","10.1145\/3507548"],"URL":"https:\/\/doi.org\/10.1145\/3507548.3507552","relation":{},"subject":[],"published":{"date-parts":[[2021,12,4]]},"assertion":[{"value":"2022-03-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}