{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:33Z","timestamp":1750220073259,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T00:00:00Z","timestamp":1672963200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,1,6]]},"DOI":"10.1145\/3582649.3582657","type":"proceedings-article","created":{"date-parts":[[2023,4,7]],"date-time":"2023-04-07T16:23:28Z","timestamp":1680884608000},"page":"168-174","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A YOLO-CDA X-ray Image Detection Algorithm"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3694-2732","authenticated-orcid":false,"given":"Yongjian","family":"Li","sequence":"first","affiliation":[{"name":"College of Information Engineering, Nanchang Institute of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5918-8162","authenticated-orcid":false,"given":"Huasheng","family":"Zhu","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Nanchang Institute of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9375-9467","authenticated-orcid":false,"given":"Mingzhi","family":"He","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Nanchang Institute of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9787-0912","authenticated-orcid":false,"given":"Shuyin","family":"Tang","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Nanchang Institute of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0776-9942","authenticated-orcid":false,"given":"Zhanxin","family":"Sun","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Nanchang Institute of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,7]]},"reference":[{"issue":"04","key":"e_1_3_2_1_1_1","first-page":"335","volume":"2018","author":"Chen Yang","unstructured":"Chen Yang . Status Quo of Metro Security Inspection Equipment and New Concept of Research and Development [J]. Low Carbon World , 2018 ( 04 ): 335 - 336 . Chen Yang. Status Quo of Metro Security Inspection Equipment and New Concept of Research and Development [J]. Low Carbon World,2018(04):335-336.","journal-title":"Low Carbon World"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.18178\/joig.9.4.122-134"},{"key":"e_1_3_2_1_3_1","volume-title":"Explosives detection systems (EDS) for aviation security[J]. Signal processing","author":"Singh S","year":"2003","unstructured":"Singh S , Singh M. Explosives detection systems (EDS) for aviation security[J]. Signal processing , 2003 , 83(1): 31-55. Singh S, Singh M. Explosives detection systems (EDS) for aviation security[J]. Signal processing, 2003, 83(1): 31-55."},{"key":"e_1_3_2_1_4_1","volume-title":"Computer vision technology for X-ray testing[J]. Insight-non-destructive testing and condition monitoring","author":"Mery D.","year":"2014","unstructured":"Mery D. Computer vision technology for X-ray testing[J]. Insight-non-destructive testing and condition monitoring , 2014 , 56(3): 147-155. Mery D. Computer vision technology for X-ray testing[J]. Insight-non-destructive testing and condition monitoring, 2014, 56(3): 147-155."},{"key":"e_1_3_2_1_5_1","unstructured":"FUZZY I U. DETECTION OF CONCEALED WEAPONS IN X-RAY[J].  FUZZY I U. DETECTION OF CONCEALED WEAPONS IN X-RAY[J]."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.18178\/joig.7.4.140-144"},{"issue":"07","key":"e_1_3_2_1_7_1","first-page":"224","volume":"31","author":"Zhang\u00a0Na","year":"2022","unstructured":"Zhang\u00a0Na ,\u00a0Luo\u00a0Yuan , X-ray Security Inspection for Contraband Detection Based on Improved Cascade RCNN Network , 2022 , 31 ( 07 ): 224 - 230 . Zhang\u00a0Na,\u00a0Luo\u00a0Yuan, X-ray Security Inspection for Contraband Detection Based on Improved Cascade RCNN Network, 2022,31(07):224-230.","journal-title":"X-ray Security Inspection for Contraband Detection Based on Improved Cascade RCNN Network"},{"key":"e_1_3_2_1_8_1","first-page":"1096","volume":"2020","author":"Zhang Youkang","unstructured":"Zhang Youkang , Su Zhigang, Multi -scale Prohibited Item Detection in X-ray Security Image [J]. Journal of Signal Processing , 2020 ,36(07): 1096 - 1106 . Zhang Youkang, Su Zhigang, Multi-scale Prohibited Item Detection in X-ray Security Image [J]. Journal of Signal Processing,2020,36(07):1096-1106.","journal-title":"Journal of Signal Processing"},{"key":"e_1_3_2_1_9_1","first-page":"65","volume":"2021","author":"Guo Ruihong","unstructured":"Guo Ruihong , Zhang Li, X- Ray Image Controlled Knife Detection and Recognition Based on Improved SSD [J]. Advances in Lasers and Optoelectronics , 2021 ,58(04): 65 - 72 . Guo Ruihong, Zhang Li, X-Ray Image Controlled Knife Detection and Recognition Based on Improved SSD [J]. Advances in Lasers and Optoelectronics,2021,58(04):65-72.","journal-title":"Advances in Lasers and Optoelectronics"},{"key":"e_1_3_2_1_10_1","first-page":"75","volume":"2021","author":"Guo Shouxiang","unstructured":"Guo Shouxiang , Zhang Liang. Yolo-C: One-Stage Network for Prohibited Items Detection Within X-ray Images [J]. Advances in Lasers and Optoelectronics , 2021 ,58(08): 75 - 84 . Guo Shouxiang, Zhang Liang. Yolo-C: One-Stage Network for Prohibited Items Detection Within X-ray Images [J]. Advances in Lasers and Optoelectronics,2021,58(08):75-84.","journal-title":"Advances in Lasers and Optoelectronics"},{"key":"e_1_3_2_1_11_1","first-page":"2675","volume":"2021","author":"Mu Siqi","unstructured":"Mu Siqi , Lin Jinjian, An Algorithm for Detection of Prohibited Items in X-ray Images Based on Improved YOLOv4 [J]. Acta Armamentarii , 2021 ,42(12): 2675 - 2683 . Mu Siqi, Lin Jinjian, An Algorithm for Detection of Prohibited Items in X-ray Images Based on Improved YOLOv4 [J]. Acta Armamentarii,2021,42(12):2675-2683.","journal-title":"Acta Armamentarii"},{"key":"e_1_3_2_1_12_1","first-page":"1417","volume":"2021","author":"Wu Haibin","unstructured":"Wu Haibin , Wei Xiying, Improved YOLOv4 for dangerous goods detection in X-ray inspection combined with atrous convolution and transfer learning [J]. Chinese Optics , 2021 ,14(06): 1417 - 1425 . Wu Haibin, Wei Xiying, Improved YOLOv4 for dangerous goods detection in X-ray inspection combined with atrous convolution and transfer learning [J]. Chinese Optics,2021,14(06):1417-1425.","journal-title":"Chinese Optics"},{"key":"e_1_3_2_1_13_1","volume-title":"Xu R","author":"Wang J","year":"2019","unstructured":"Wang J , Chen K , Xu R , Carafe : Content-aware reassembly of features[C]\/\/Proceedings of the IEEE\/CVF international conference on computer vision. 2019 : 3007-3016. Wang J, Chen K, Xu R, Carafe: Content-aware reassembly of features[C]\/\/Proceedings of the IEEE\/CVF international conference on computer vision. 2019: 3007-3016."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Fu J Liu J Tian H Dual attention network for scene segmentation[C]\/\/Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 2019: 3146-3154.  Fu J Liu J Tian H Dual attention network for scene segmentation[C]\/\/Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 2019: 3146-3154.","DOI":"10.1109\/CVPR.2019.00326"},{"key":"e_1_3_2_1_15_1","volume-title":"mixup: Beyond empirical risk minimization[J]. arXiv preprint arXiv:1710.09412","author":"Zhang H","year":"2017","unstructured":"Zhang H , Cisse M , Dauphin Y N , mixup: Beyond empirical risk minimization[J]. arXiv preprint arXiv:1710.09412 , 2017 . Zhang H, Cisse M, Dauphin Y N, mixup: Beyond empirical risk minimization[J]. arXiv preprint arXiv:1710.09412, 2017."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Lin T Y Doll\u00e1r P Girshick R Feature pyramid networks for object detection[C]\/\/Proceedings of the IEEE conference on computer vision and pattern recognition. 2017: 2117-2125.  Lin T Y Doll\u00e1r P Girshick R Feature pyramid networks for object detection[C]\/\/Proceedings of the IEEE conference on computer vision and pattern recognition. 2017: 2117-2125.","DOI":"10.1109\/CVPR.2017.106"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Liu S Qi L Qin H Path aggregation network for instance segmentation[C]\/\/Proceedings of the IEEE conference on computer vision and pattern recognition. 2018: 8759-8768.  Liu S Qi L Qin H Path aggregation network for instance segmentation[C]\/\/Proceedings of the IEEE conference on computer vision and pattern recognition. 2018: 8759-8768.","DOI":"10.1109\/CVPR.2018.00913"},{"key":"e_1_3_2_1_18_1","first-page":"5412","volume":"2021","author":"Wang B","unstructured":"Wang B , Zhang L , Wen L , Towards Real-World Prohibited Item Detection: A Large-Scale X-ray Benchmark[C]\/\/ Proceedings of the IEEE\/CVF International Conference on Computer Vision. 2021 : 5412 - 5421 . Wang B, Zhang L, Wen L, Towards Real-World Prohibited Item Detection: A Large-Scale X-ray Benchmark[C]\/\/Proceedings of the IEEE\/CVF International Conference on Computer Vision. 2021: 5412-5421.","journal-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6999"}],"event":{"name":"ICIGP 2023: 2023 The 6th International Conference on Image and Graphics Processing","acronym":"ICIGP 2023","location":"Chongqing China"},"container-title":["Proceedings of the 2023 6th International Conference on Image and Graphics Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3582649.3582657","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3582649.3582657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:14Z","timestamp":1750183754000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3582649.3582657"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,6]]},"references-count":19,"alternative-id":["10.1145\/3582649.3582657","10.1145\/3582649"],"URL":"https:\/\/doi.org\/10.1145\/3582649.3582657","relation":{},"subject":[],"published":{"date-parts":[[2023,1,6]]},"assertion":[{"value":"2023-04-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}