{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T08:21:22Z","timestamp":1770970882340,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,23]]},"DOI":"10.1145\/3558819.3565151","type":"proceedings-article","created":{"date-parts":[[2022,10,27]],"date-time":"2022-10-27T01:37:33Z","timestamp":1666834653000},"page":"604-607","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A pedestrian detection algorithm based on deep learning"],"prefix":"10.1145","author":[{"given":"Jiangkun","family":"Lu","sequence":"first","affiliation":[{"name":"Chongqing College of Humanities, Science &amp; Technology, China"}]},{"given":"Hongyang","family":"Chen","sequence":"additional","affiliation":[{"name":"Chongqing College of Humanities, Science &amp; Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuron.2012.01.010"},{"key":"e_1_3_2_1_2_1","volume-title":"Crowd Dynamics and the Design and Management of Public Places(C].International Conference on Building Use and Safety Technology","author":"Fruin J.J.","year":"1985","unstructured":"Fruin J.J. Crowd Dynamics and the Design and Management of Public Places(C].International Conference on Building Use and Safety Technology , National Institute of Building Sciences , Washington DC , 1985 ,110-113. Fruin J.J. Crowd Dynamics and the Design and Management of Public Places(C].International Conference on Building Use and Safety Technology, National Institute of Building Sciences, Washington DC,1985,110-113."},{"key":"e_1_3_2_1_3_1","first-page":"1324","volume":"2010","author":"Lempitsky V","unstructured":"Lempitsky V , Zisserman A. Learning to count objects in images[C]\/\/ Advances in Neural Information Processing Systems. 2010 : 1324 - 1332 . Lempitsky V, Zisserman A. Learning to count objects in images[C]\/\/Advances in Neural Information Processing Systems. 2010: 1324-1332.","journal-title":"Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_4_1","unstructured":"Ren S He K Girshick R Faster r-cnn: Towards real-time object detection with region proposal networks[C]\/\/Advances in neural information processing systems. 2015: 91-99.  Ren S He K Girshick R Faster r-cnn: Towards real-time object detection with region proposal networks[C]\/\/Advances in neural information processing systems. 2015: 91-99."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Girshick R Donahue J Darrell T Rich feature hierarchies for accurate object detection and semantic segmentation[C]\/\/Proceedings of the IEEE conference on computer vision and pattern recognition. 2014: 580-587.  Girshick R Donahue J Darrell T Rich feature hierarchies for accurate object detection and semantic segmentation[C]\/\/Proceedings of the IEEE conference on computer vision and pattern recognition. 2014: 580-587.","DOI":"10.1109\/CVPR.2014.81"},{"key":"e_1_3_2_1_6_1","first-page":"66","volume-title":"Computer Science","author":"Simonyan K","year":"2014","unstructured":"Simonyan K , Zisserman A. Very Deep Convolutional Networks for Large-Scale Image Recognition[J] . Computer Science , 2014 . pp. 66 - 79 . Simonyan K, Zisserman A. Very Deep Convolutional Networks for Large-Scale Image Recognition[J]. Computer Science, 2014. pp. 66-79."}],"event":{"name":"ICCSIE2022: 7th International Conference on Cyber Security and Information Engineering","location":"Brisbane QLD Australia","acronym":"ICCSIE2022"},"container-title":["Proceedings of the 7th International Conference on Cyber Security and Information Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558819.3565151","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558819.3565151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:29Z","timestamp":1750186829000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558819.3565151"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":6,"alternative-id":["10.1145\/3558819.3565151","10.1145\/3558819"],"URL":"https:\/\/doi.org\/10.1145\/3558819.3565151","relation":{},"subject":[],"published":{"date-parts":[[2022,9,23]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}