{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T15:40:03Z","timestamp":1755877203975,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,3,22]],"date-time":"2024-03-22T00:00:00Z","timestamp":1711065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"?????????????","award":["2022KTSCX218"],"award-info":[{"award-number":["2022KTSCX218"]}]},{"name":"?????????","award":["20221800500012"],"award-info":[{"award-number":["20221800500012"]}]},{"name":"????????????","award":["20234430-01KCJ-G"],"award-info":[{"award-number":["20234430-01KCJ-G"]}]},{"name":"????????","award":["62273096"],"award-info":[{"award-number":["62273096"]}]},{"name":"????????????????????","award":["2020B1515120095"],"award-info":[{"award-number":["2020B1515120095"]}]},{"name":"??????????????","award":["62203116"],"award-info":[{"award-number":["62203116"]}]},{"name":"???????????????","award":["20231800935882","20211800904692?20211800904492"],"award-info":[{"award-number":["20231800935882","20211800904692?20211800904492"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,3,22]]},"DOI":"10.1145\/3654823.3654863","type":"proceedings-article","created":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T16:20:33Z","timestamp":1716999633000},"page":"217-223","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["X-ray Security Contraband Detection Based on Improved YOLOX"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3978-1265","authenticated-orcid":false,"given":"Kaiwei","family":"Liu","sequence":"first","affiliation":[{"name":"School of computer science and technology(School of Software, School of Cyberspace Security), Dongguan University of Technology, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2654-5327","authenticated-orcid":false,"given":"Bin","family":"Ren","sequence":"additional","affiliation":[{"name":"International Institute of Microelectronics, Dongguan University of Technology, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3617-7401","authenticated-orcid":false,"given":"Chunhong","family":"He","sequence":"additional","affiliation":[{"name":"School of Urban Construction and Environment, Dongguan City University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3756-1672","authenticated-orcid":false,"given":"Fujie","family":"Wang","sequence":"additional","affiliation":[{"name":"School of computer science and technology(School of Software, School of Cyberspace Security), Dongguan University of Technology, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2039-9926","authenticated-orcid":false,"given":"Ziming","family":"Xu","sequence":"additional","affiliation":[{"name":"International Institute of Microelectronics, Dongguan University of Technology, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,5,29]]},"reference":[{"issue":"05","key":"e_1_3_2_1_1_1","first-page":"65","article-title":"Research on countermeasures to improve the quality of security inspection work in railway stations","volume":"18","author":"Li Jie","year":"2023","unstructured":"Jie Li and Fang Geng. Research on countermeasures to improve the quality of security inspection work in railway stations. Railway Procurement and Logistics,18(05):65\u201367, 2023.","journal-title":"Railway Procurement and Logistics"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781003108016"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.57235\/jetish.v1i1.27"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2016.2628381"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12051179"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413828"},{"key":"e_1_3_2_1_7_1","first-page":"1","article-title":"On using xmc r-cnn model for contraband detection within x-ray baggage security images","volume":"2020","author":"Zhang Yong","year":"2020","unstructured":"Yong Zhang, Weiwu Kong, Dong Li, and Xudong Liu. On using xmc r-cnn model for contraband detection within x-ray baggage security images. Mathematical Problems in Engineering, 2020:1\u201314, 2020.","journal-title":"Mathematical Problems in Engineering"},{"key":"e_1_3_2_1_8_1","volume-title":"Improved YOLOv5 Model for X-Ray Prohibited Item Detection[J]. Laser & Optoelectronics Progress","author":"Dong Yishan","year":"2023","unstructured":"Yishan Dong, Zhaoxin Li, Jingyuan Guo, Tianyu Chen, Shuhua Lu. Improved YOLOv5 Model for X-Ray Prohibited Item Detection[J]. Laser & Optoelectronics Progress, 2023, 60(4): 0415005."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1364\/AO.461627"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0272961"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1364\/AO.461627"},{"key":"e_1_3_2_1_12_1","first-page":"1177","volume-title":"Proceedings of the Asian Conference on Computer Vision","author":"Zhang Hu","year":"2022","unstructured":"Hu Zhang, Keke Zu, Jian Lu, Yuru Zou, and Deyu Meng. Epsanet: An efficient pyramid squeeze attention block on convolutional neural network. In Proceedings of the Asian Conference on Computer Vision, pages 1161\u20131177, 2022."},{"issue":"22","key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"2210002","DOI":"10.3788\/LOP202158.2210002","article-title":"Multi-Scale Detection for X-Ray Prohibited Items in Complex Background[J]","volume":"58","author":"Zhang Ke","year":"2021","unstructured":"Ke Zhang, Liang Zhang. Multi-Scale Detection for X-Ray Prohibited Items in Complex Background[J]. Laser & Optoelectronics Progress, 2021, 58(22): 2210002.","journal-title":"Laser & Optoelectronics Progress"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00222"},{"key":"e_1_3_2_1_15_1","first-page":"21","volume-title":"Anomaly Detection and Imaging with X-Rays (ADIX) V","author":"Sigman John B","unstructured":"John B Sigman, Gregory P Spell, Kevin J Liang, and Lawrence Carin. Background adaptive faster r-cnn for semi-supervised convolutional object detection of threats in x-ray images. In Anomaly Detection and Imaging with X-Rays (ADIX) V, volume 11404, pages 12\u201321. SPIE, 2020."},{"key":"e_1_3_2_1_16_1","unstructured":"Sue Xingwang Wang Xiaoming Huang Jinbo Detection of contraband in X-ray security screening based on deformable convolution and attention mechanism[J].Electronic Measurement Technology."},{"key":"e_1_3_2_1_17_1","first-page":"2023","author":"Yu","year":"2023","unstructured":"Yu H, Yun L, Chen Z, A Small Object Detection Algorithm Based on Modulated Deformable Convolution and Large Kernel Convolution[J]. Computational Intelligence and Neuroscience, 2023, 2023.","journal-title":"Computational Intelligence and Neuroscience"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3390\/app132011493"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23146423"},{"key":"e_1_3_2_1_20_1","volume-title":"Yolox: Exceeding yolo series","author":"Ge Zheng","year":"2021","unstructured":"Zheng Ge, Songtao Liu, Feng Wang, Zeming Li, and Jian Sun. Yolox: Exceeding yolo series in 2021. arXiv preprint arXiv:2107.08430, 2021."},{"key":"e_1_3_2_1_21_1","first-page":"9316","volume-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","author":"Zhu Xizhou","year":"2019","unstructured":"Xizhou Zhu, Han Hu, Stephen Lin, and Jifeng Dai. Deformable convnets v2: More deformable, better results. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pages 9308\u20139316, 2019."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Misra D Nalamada T Arasanipalai A U Rotate to attend: Convolutional triplet attention module[C]\/\/Proceedings of the IEEE\/CVF winter conference on applications of computer vision. 2021: 3139-3148.","DOI":"10.1109\/WACV48630.2021.00318"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"e_1_3_2_1_24_1","volume-title":"An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929","author":"Dosovitskiy Alexey","year":"2020","unstructured":"Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov, Dirk Weissenborn, Xiaohua Zhai, Thomas Unterthiner, Mostafa Dehghani, Matthias Minderer, Georg Heigold, Sylvain Gelly, An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929, 2020."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00644"},{"key":"e_1_3_2_1_29_1","first-page":"37","volume-title":"Proceedings, Part I 14","author":"Liu Wei","unstructured":"Wei Liu, Dragomir Anguelov, Dumitru Erhan, Christian Szegedy, Scott Reed, Cheng-Yang Fu, and Alexander C Berg. Ssd: Single shot multibox detector. In Computer Vision\u2013ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11\u201314, 2016, Proceedings, Part I 14, pages 21\u201337. Springer, 2016."},{"key":"e_1_3_2_1_30_1","volume-title":"MMYOLO: OpenMMLab YOLO series toolbox and benchmark. https:\/\/github.com\/open-mmlab\/mmyolo","author":"Contributors MMYOLO","year":"2022","unstructured":"MMYOLO Contributors. MMYOLO: OpenMMLab YOLO series toolbox and benchmark. https:\/\/github.com\/open-mmlab\/mmyolo, 2022."}],"event":{"name":"CACML 2024: 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning","acronym":"CACML 2024","location":"Shanghai China"},"container-title":["Proceedings of the 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3654823.3654863","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3654823.3654863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T15:16:07Z","timestamp":1755875767000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3654823.3654863"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,22]]},"references-count":30,"alternative-id":["10.1145\/3654823.3654863","10.1145\/3654823"],"URL":"https:\/\/doi.org\/10.1145\/3654823.3654863","relation":{},"subject":[],"published":{"date-parts":[[2024,3,22]]},"assertion":[{"value":"2024-05-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}