{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:40:07Z","timestamp":1755880807057,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T00:00:00Z","timestamp":1714089600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"China Three Gorges University","doi-asserted-by":"publisher","award":["2019ZYYD007"],"award-info":[{"award-number":["2019ZYYD007"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,26]]},"DOI":"10.1145\/3653644.3665207","type":"proceedings-article","created":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T18:24:49Z","timestamp":1726856689000},"page":"27-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["MSANet: Multi scale prohibited item detection with tripe attention"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-8107-5482","authenticated-orcid":false,"given":"Zhengping","family":"Wu","sequence":"first","affiliation":[{"name":"Hubei Key Laboratory of Intelligent Visual Monitoring for Hydropower Engineering, China, \rSchool of Computer and Information, China Three Gorges University, China and \rYichang Key Laboratory of Hydropower Engineering Vision Supervision, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4644-9850","authenticated-orcid":false,"given":"Peng","family":"Zhu","sequence":"additional","affiliation":[{"name":"Hubei Key Laboratory of Intelligent Visual Monitoring for Hydropower Engineering, China, \rSchool of Computer and Information, China Three Gorges University, China and \rYichang Key Laboratory of Hydropower Engineering Vision Supervision, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5655-9594","authenticated-orcid":false,"given":"Bangjun","family":"Lei","sequence":"additional","affiliation":[{"name":"Hubei Key Laboratory of Intelligent Visual Monitoring for Hydropower Engineering, China, \rSchool of Computer and Information, China Three Gorges University, China and \rYichang Key Laboratory of Hydropower Engineering Vision Supervision, China"}]}],"member":"320","published-online":{"date-parts":[[2024,9,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","unstructured":"Krizhevsky Alex IIya Sutskever and Geoffrey E. Hinton.2012. Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems 25. [DOI:https\/\/doi.org\/10.1145\/3065386]","DOI":"10.1145\/3065386]"},{"volume-title":"Proceedings Cranfield Defence and Security Doctoral Symposium. 1-12","author":"Nicolas Jaccard","key":"e_1_3_2_1_2_1","unstructured":"Jaccard Nicolas,Thomas W. Rogers,E J Morton and L D Griffin.2015. Using deep learning on X-ray images to detect threats. Proceedings Cranfield Defence and Security Doctoral Symposium. 1-12."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Samet Ak\u00e7ay Mikolaj E. Kundegorski Michael Devereux and Toby P. Brekon.2016.Transfer learning using convolutional neural networks forobject classification within X-ray baggage security imagery.Procedings of 2016 IEEE International Conference on Image Processing. Phoenix USA:IEEE:1057-1061.DOI:10.1109\/ICIP.2016.7532519","DOI":"10.1109\/ICIP.2016.7532519"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851829"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","unstructured":"Hassan Taimur Naoufel Werghi. 2020. Trainable structure tensors for au-tonomous baggage threat detection under extreme occlusion.Proceedings of the Asian Conference on Computer Vi-sion.Japan:Springer.DOI:https:\/\/doi.org\/10.1007\/978-3-030-69544-6_16","DOI":"10.1007\/978-3-030-69544-6_16"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.11834\/jig.210368"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Ross Girshick Jeff Donahue Trevor Darrell and JitendraMalik. 2014.Rich feature hierarchies for accurate object detectionand semantic segmentation. In CVPR.580-587","DOI":"10.1109\/CVPR.2014.81"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Kaiming He Xiangyu Zhang Shaoiqing Ren and Jian Sun.2016.Deep residual learning for image recognition. In CVPR.770-778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_11_1","volume-title":"Marco Andreetto and Harrtwig Adam","author":"Howard Andrew","year":"2017","unstructured":"Howard Andrew G, Menglong Zhu, Bo Chen, Dmitry Kalenichenko, Weijun Wang, Tobias Weyand, Marco Andreetto and Harrtwig Adam. 2017.MobileNets: Efficient convolutional neural networks for mobile vision applications.arXiv:1704.04861."},{"key":"e_1_3_2_1_12_1","volume-title":"Laurens van Der Maaten and Kilian Q. Weinberger","author":"Huang Gao","year":"2017","unstructured":"Gao Huang, Zhuang Liu, Laurens van Der Maaten and Kilian Q. Weinberger. 2017.Densely connected convolutional networks. In CVPR.4700-4708"},{"key":"e_1_3_2_1_13_1","volume-title":"Ross Girshick,Kaiming He and Piotr Doll\u00e1r.","author":"Iija Radosavovic","year":"2020","unstructured":"Radosavovic IIija, Raj Prateek Kosaraju, Ross Girshick,Kaiming He and Piotr Doll\u00e1r. 2020.Designing network design spaces. In CVPR.10428-10436."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Szegedy Christian Wei Liu Yangqing Jia Pierrre Sermanet Scott Reed Dragomir Anguelov Dumitru Erhan Vincent Vanhoucke and Andew Rabinovich. 2015.Going deeper with convolutions. In CVPR.1-9","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"e_1_3_2_1_15_1","unstructured":"Mingxing Tan and Quoc Le. 2019.Efficientnet: Rethinking model scaling for convolutional neural networks. In ICML.6105-6114."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","unstructured":"Saining Xie Ross Girshick Piotr Doll\u00e1r Zhuowen Tu and Kaiming He. 2017.Aggregated residual transformations for deep neural networks. In CVPR.DOI:https:\/\/doi.org\/10.48550\/arXiv.1611.05431","DOI":"10.48550\/arXiv.1611.05431"},{"key":"e_1_3_2_1_17_1","first-page":"16133","article-title":"Convnext v2: Co-designing and scaling convnets with masked autoencoders","author":"Sanghyun Woo","year":"2023","unstructured":"Woo Sanghyun,Shoubhik Debnath,Ronghang Hu ,Xinlei Chen,Zhang Liu, In So Kweon and Saining Xie.2023. Convnext v2: Co-designing and scaling convnets with masked autoencoders. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 16133-16142.","journal-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"Hu jie Li Shen and Gang Sun.2018.Squeeze-and-excitation networks.In CVPR.7132-7141.DOI: 10.1109\/CVPR.2018.00745","DOI":"10.1109\/CVPR.2018.00745"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","unstructured":"Woo Sanghyun Jongchan Park Joon-Young Lee and In So kweon.2018. CBAM: Conv-olutional block attention module.Proceedings of the Euro-pean conference on computer vision.Germany:Springer:3-19. DOI:https:\/\/doi.org\/10.48550\/arXiv.1807.06521","DOI":"10.48550\/arXiv.1807.06521"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2103.02907"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Chen Liang-Chieh Yukun Zhu George Papandreou Florian Schroff and Hartwig Adam.2018.Encoder-decoder with atrous separable convolution for semantic image segmentation.Proceedings of the European conference on computer vision.Germany:Springer:801-818.","DOI":"10.1007\/978-3-030-01234-2_49"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","unstructured":"Miao Caijing Lingxi Xie Fang Wan Chi Su Hongye Liu Jianbin Jiao and Qixiang Ye.2019. Sixray:A large-scale security inspection x-ray benchmark for prohibited item discovery in overlapping images. In CVPR.DOI: 10.1109\/CVPR.2019.00222","DOI":"10.1109\/CVPR.2019.00222"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"Tao Renshuai Yanlu Wei Xiangjian Jiang Hainan Li Haotong Qin Jiakai Wang Yuqing Ma Libo Zhang and Xianglong Liu. 2021.Towards real-world X-ray security inspection:A high-quality benchmark and lateral inhibition module for prohibited items detection.Proceedings of the IEEE\/CVF international conference on computer vision.10923-10932.DOI:https:\/\/doi.org\/10.1109\/iccv48922.2021.01074","DOI":"10.1109\/iccv48922.2021.01074"}],"event":{"name":"FAIML 2024: 2024 3rd International Conference on Frontiers of Artificial Intelligence and Machine Learning","acronym":"FAIML 2024","location":"Yichang China"},"container-title":["Proceedings of the 2024 3rd International Conference on Frontiers of Artificial Intelligence and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3653644.3665207","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3653644.3665207","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:24:41Z","timestamp":1755879881000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3653644.3665207"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,26]]},"references-count":23,"alternative-id":["10.1145\/3653644.3665207","10.1145\/3653644"],"URL":"https:\/\/doi.org\/10.1145\/3653644.3665207","relation":{},"subject":[],"published":{"date-parts":[[2024,4,26]]},"assertion":[{"value":"2024-09-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}