{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T02:10:03Z","timestamp":1755915003062,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,24]],"date-time":"2023-11-24T00:00:00Z","timestamp":1700784000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,24]]},"DOI":"10.1145\/3638682.3638683","type":"proceedings-article","created":{"date-parts":[[2024,5,22]],"date-time":"2024-05-22T15:32:08Z","timestamp":1716391928000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Dangerous Goods Detection in X-ray Security Inspection Images Based on Improved YOLOv7"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-3006-6601","authenticated-orcid":false,"given":"Enyan","family":"Zhang","sequence":"first","affiliation":[{"name":"Heilongjiang Province Key Laboratory of Laser Spectroscopy Technology and Application, Harbin University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3566-1697","authenticated-orcid":false,"given":"Yunhong","family":"Yang","sequence":"additional","affiliation":[{"name":"Heilongjiang Province Key Laboratory of Laser Spectroscopy Technology and Application, Harbin University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4926-7851","authenticated-orcid":false,"given":"Yanxiang","family":"Feng","sequence":"additional","affiliation":[{"name":"Heilongjiang Province Key Laboratory of Laser Spectroscopy Technology and Application, Harbin University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0878-6494","authenticated-orcid":false,"given":"Zeyu","family":"Hu","sequence":"additional","affiliation":[{"name":"Heilongjiang Province Key Laboratory of Laser Spectroscopy Technology and Application, Harbin University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9118-230X","authenticated-orcid":false,"given":"Aili","family":"Wang","sequence":"additional","affiliation":[{"name":"Heilongjiang Province Key Laboratory of Laser Spectroscopy Technology and Application, Harbin University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1016-1636","authenticated-orcid":false,"given":"Yuji","family":"Iwahori","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Chubu University, Japan"}]}],"member":"320","published-online":{"date-parts":[[2024,5,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.27822\/d.cnki.gszxj.2022.000049"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.18178\/joig.10.2.56-63"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.18178\/joig.11.2.204-211"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.18178\/joig.9.4.122-134"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.18178\/joig.7.4.140-144"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.18178\/joig.7.3.102-106"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.18178\/joig.8.2.53-58"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.18178\/joig.8.3.59-66"},{"key":"e_1_3_2_1_9_1","first-page":"1198","article-title":"Deep convolution network for Contraband detection based on YOLO","volume":"2021","author":"Zhu Cheng","unstructured":"Cheng Zhu,Baiyan Li,Xiaoqiang Liu, \"Deep convolution network for Contraband detection based on YOLO, \" [J]. Journal of Hefei University of Technology (Natural Science Edition),2021,44(09):1198-1203.","journal-title":"Journal of Hefei University of Technology (Natural Science Edition)"},{"issue":"01","key":"e_1_3_2_1_10_1","first-page":"197","article-title":"Improved YOLOv3 security inspection algorithm for detecting dangerous goods in packages","volume":"38","author":"Lu Guanyou","year":"2021","unstructured":"Guanyou Lu,Zheng Gu, \"Improved YOLOv3 security inspection algorithm for detecting dangerous goods in packages, \" [J]. Computer Application and Software, 2021,38(01):197-204.","journal-title":"[J]. Computer Application and Software"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"e_1_3_2_1_12_1","first-page":"359","article-title":"An improved X-ray Contraband detection model of YOLOv5","volume":"2023","author":"Dong Yishan","unstructured":"Yishan Dong,Zhaoxin Li, \"An improved X-ray Contraband detection model of YOLOv5,\" [J]. Progress in Laser and Optoelectronics,2023,60(04):359-366.","journal-title":"[J]. Progress in Laser and Optoelectronics"},{"key":"e_1_3_2_1_13_1","first-page":"52","article-title":"Contraband target detection algorithm based on improved YOLOv5 in X-ray security inspection image","volume":"2022","author":"Wu Suxue","year":"2015","unstructured":"Suxue Wu, \"Contraband target detection algorithm based on improved YOLOv5 in X-ray security inspection image, \" [J]. Modern Computers,2022,28(20):52-56.Jason Jerald. 2015. The VR Book: Human-Centered Design for Virtual Reality. Association for Computing Machinery and Morgan & Claypool.","journal-title":"[J]. Modern Computers"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2207.02696.R"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.19292\/j.cnki.jdxxp.20230515.003"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2103.02907.TUG"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01079"},{"key":"e_1_3_2_1_18_1","first-page":"2023","article-title":"Improving YOLOv7 tiny's real-time detection algorithm for safety helmets","volume":"1","author":"Zhao Min","unstructured":"Min Zhao,Guoliang Yang,Jixiang Wang, \"Improving YOLOv7 tiny's real-time detection algorithm for safety helmets, \" [J\/OL]. Radio Engineering:1-11[2023-06-09].","journal-title":"[J\/OL]. Radio Engineering"},{"key":"e_1_3_2_1_19_1","volume-title":"Beyond empirical risk minimization, \" [J]. arXiv preprint arXiv:1710.09412","author":"ZHANG H, CISSE M, DAUPHIN Y N","year":"2017","unstructured":"ZHANG H, CISSE M, DAUPHIN Y N, , \"mixup: Beyond empirical risk minimization, \" [J]. arXiv preprint arXiv:1710.09412, 2017"},{"key":"e_1_3_2_1_20_1","volume-title":"LIAO H Y M, \"YOLOv4: Optimal speed and accuracy of object detection, \" [J]. arXiv preprint arXiv:2004.10934","author":"BOCHKOVSKIY A, WANG C","year":"2020","unstructured":"BOCHKOVSKIY A, WANG C Y, LIAO H Y M, \"YOLOv4: Optimal speed and accuracy of object detection, \" [J]. arXiv preprint arXiv:2004.10934, 2020."},{"key":"e_1_3_2_1_21_1","first-page":"618","article-title":"Gradcam: Visual explanations from deep networks via gradientbased localization","volume":"2017","author":"SELVARAJU R R, COGSWELL M, DAS","unstructured":"SELVARAJU R R, COGSWELL M, DAS A, , \"Gradcam: Visual explanations from deep networks via gradientbased localization, \" [C]\/\/Proceedings of the IEEE international conference on computer vision. 2017: 618-626","journal-title":"[C]\/\/Proceedings of the IEEE international conference on computer vision."}],"event":{"name":"VSIP 2023: 2023 the 5th International Conference on Video, Signal and Image Processing","acronym":"VSIP 2023","location":"Harbin China"},"container-title":["Proceedings of the 2023 5th International Conference on Video, Signal and Image Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638682.3638683","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3638682.3638683","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:59:41Z","timestamp":1755914381000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638682.3638683"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,24]]},"references-count":21,"alternative-id":["10.1145\/3638682.3638683","10.1145\/3638682"],"URL":"https:\/\/doi.org\/10.1145\/3638682.3638683","relation":{},"subject":[],"published":{"date-parts":[[2023,11,24]]},"assertion":[{"value":"2024-05-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}