{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T08:04:39Z","timestamp":1750320279621,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T00:00:00Z","timestamp":1671753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,23]]},"DOI":"10.1145\/3578741.3578814","type":"proceedings-article","created":{"date-parts":[[2023,3,7]],"date-time":"2023-03-07T04:18:52Z","timestamp":1678162732000},"page":"342-346","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["An optimization method of railway identification based on BiSeNet"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4989-7213","authenticated-orcid":false,"given":"Ming","family":"Jin","sequence":"first","affiliation":[{"name":"Suzhou Rail Transit Group Co., Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0465-7264","authenticated-orcid":false,"given":"Hao","family":"Yuan","sequence":"additional","affiliation":[{"name":"School of Rail Transportation, Soochow University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4161-7694","authenticated-orcid":false,"given":"Jin","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Rail Transportation, Soochow University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,3,6]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1283","article-title":"Robust remote mutual authentication scheme with key agreement","volume":"16","author":"Chou Tsai","year":"2015","unstructured":"K.Y.\u00a0 Tsai C.H.\u00a0 Chou and T.C. Wu . 2015 . Robust remote mutual authentication scheme with key agreement . Journal of Internet Technology 16 , 7 (2015), 1283 \u2013 1289 . K.Y.\u00a0Tsai C.H.\u00a0Chou and T.C. Wu. 2015. Robust remote mutual authentication scheme with key agreement. Journal of Internet Technology 16, 7 (2015), 1283\u20131289.","journal-title":"Journal of Internet Technology"},{"key":"e_1_3_2_1_2_1","volume-title":"2017 IEEE Conference on Computer Vision and Pattern Recognition","author":"Changqian\u00a0Yu Jingbo\u00a0Wang","year":"2017","unstructured":"Jingbo\u00a0Wang Changqian\u00a0Yu and Chao Peng . 2017 . Pyramid scene parsing network . 2017 IEEE Conference on Computer Vision and Pattern Recognition (2017), 6230\u20136239. Jingbo\u00a0Wang Changqian\u00a0Yu and Chao Peng. 2017. Pyramid scene parsing network. 2017 IEEE Conference on Computer Vision and Pattern Recognition (2017), 6230\u20136239."},{"key":"e_1_3_2_1_3_1","volume-title":"Proc of the 35th Chinese Control Conference(IEEE)","author":"Changzheng\u00a0Hou Jin\u00a0Hou","year":"2016","unstructured":"Jin\u00a0Hou Changzheng\u00a0Hou and Chaochao Yu . 2016 . An efficient lane markings detection and tracking method based on vanishing point constraints . Proc of the 35th Chinese Control Conference(IEEE) (2016), 6999\u20137004. Jin\u00a0Hou Changzheng\u00a0Hou and Chaochao Yu. 2016. An efficient lane markings detection and tracking method based on vanishing point constraints. Proc of the 35th Chinese Control Conference(IEEE) (2016), 6999\u20137004."},{"key":"e_1_3_2_1_4_1","volume-title":"Proc of the 35th Chinese Control Conference(IEEE)","author":"He\u00a0Bei Ai\u00a0Rui","year":"2016","unstructured":"Ai\u00a0Rui He\u00a0Bei and Yan Yang . 2016 . An efficient lane markings detection and tracking method based on vanishing point constraints . Proc of the 35th Chinese Control Conference(IEEE) (2016), 1041\u20131046. Ai\u00a0Rui He\u00a0Bei and Yan Yang. 2016. An efficient lane markings detection and tracking method based on vanishing point constraints. Proc of the 35th Chinese Control Conference(IEEE) (2016), 1041\u20131046."},{"key":"e_1_3_2_1_5_1","volume-title":"2017 IEEE Conference on Computer Vision and Pattern Recognition","author":"Hengshuang\u00a0Zhao Jianping\u00a0Shi","year":"2017","unstructured":"Jianping\u00a0Shi Hengshuang\u00a0Zhao and Xiaojuan Qi . 2017 . Pyramid scene parsing network . 2017 IEEE Conference on Computer Vision and Pattern Recognition (2017), 6230\u20136239. Jianping\u00a0Shi Hengshuang\u00a0Zhao and Xiaojuan Qi. 2017. Pyramid scene parsing network. 2017 IEEE Conference on Computer Vision and Pattern Recognition (2017), 6230\u20136239."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2699184"},{"key":"e_1_3_2_1_7_1","volume-title":"Research on ebusiness identity authentication system based on improved one time password. 008 4th International Conference on Wireless Communications, Networking and Mobile Computing","author":"Yan Li.","year":"2008","unstructured":"Yan Li. 2008. Research on ebusiness identity authentication system based on improved one time password. 008 4th International Conference on Wireless Communications, Networking and Mobile Computing ( 2008 ), 1\u20135. Yan Li. 2008. Research on ebusiness identity authentication system based on improved one time password. 008 4th International Conference on Wireless Communications, Networking and Mobile Computing (2008), 1\u20135."},{"key":"e_1_3_2_1_8_1","volume-title":"The 18th International Conference on Medical Image Computing and Computer-assisted Intervention","author":"Ronneberger Fischer","year":"2015","unstructured":"P.\u00a0 Fischer O.\u00a0 Ronneberger and T. Brox . 2015. U-Net: Convolutional networks for biomedical image segmentation . The 18th International Conference on Medical Image Computing and Computer-assisted Intervention ( 2015 ), 234\u2013241. P.\u00a0Fischer O.\u00a0Ronneberger and T. Brox. 2015. U-Net: Convolutional networks for biomedical image segmentation. The 18th International Conference on Medical Image Computing and Computer-assisted Intervention (2015), 234\u2013241."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2644615"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 2015 International Conference on Electrical and Information Technologies for Rail Transportation 378","author":"Yue\u00a0Qu Baohua\u00a0Wang","year":"2016","unstructured":"Baohua\u00a0Wang Yue\u00a0Qu and Ruichang Qiu . 2016 . The research and realization of contactless collision early warning assistant system . Proceedings of the 2015 International Conference on Electrical and Information Technologies for Rail Transportation 378 (2016), 147\u2013154. Baohua\u00a0Wang Yue\u00a0Qu and Ruichang Qiu. 2016. The research and realization of contactless collision early warning assistant system. Proceedings of the 2015 International Conference on Electrical and Information Technologies for Rail Transportation 378 (2016), 147\u2013154."},{"key":"e_1_3_2_1_11_1","volume-title":"Innovative development of high-speed trains in China. Locomotive electric drive 01","author":"Zhang Weihua","year":"2010","unstructured":"Weihua Zhang and Bomin Wang . 2010. Innovative development of high-speed trains in China. Locomotive electric drive 01 ( 2010 ), 8\u201312. Weihua Zhang and Bomin Wang. 2010. Innovative development of high-speed trains in China. Locomotive electric drive 01 (2010), 8\u201312."},{"key":"e_1_3_2_1_12_1","volume-title":"Proc of the 12th World Congress on Intelligent Control and Automation","author":"Zhongli\u00a0Wang Baigen\u00a0Cai","year":"2016","unstructured":"Baigen\u00a0Cai Zhongli\u00a0Wang and Chunxiao Jia . 2016 . Geometry constraintsbased visual rail track extraction . Proc of the 12th World Congress on Intelligent Control and Automation (2016), 993\u2013998. Baigen\u00a0Cai Zhongli\u00a0Wang and Chunxiao Jia. 2016. Geometry constraintsbased visual rail track extraction. Proc of the 12th World Congress on Intelligent Control and Automation (2016), 993\u2013998."}],"event":{"name":"MLNLP 2022: 2022 5th International Conference on Machine Learning and Natural Language Processing","acronym":"MLNLP 2022","location":"Sanya China"},"container-title":["Proceedings of the 2022 5th International Conference on Machine Learning and Natural Language Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3578741.3578814","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3578741.3578814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:51Z","timestamp":1750183731000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3578741.3578814"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,23]]},"references-count":12,"alternative-id":["10.1145\/3578741.3578814","10.1145\/3578741"],"URL":"https:\/\/doi.org\/10.1145\/3578741.3578814","relation":{},"subject":[],"published":{"date-parts":[[2022,12,23]]},"assertion":[{"value":"2023-03-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}