{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T02:21:41Z","timestamp":1768702901403,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,3,22]],"date-time":"2024-03-22T00:00:00Z","timestamp":1711065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Jiangsu Province Natural Science Foundation, Grant Number","award":["BK20231186"],"award-info":[{"award-number":["BK20231186"]}]},{"name":"Changzhou Sci&Tech Program","award":["CE20235053"],"award-info":[{"award-number":["CE20235053"]}]},{"name":"Key Project of Jiangsu Provincial Key Laboratory of Transmission and Distribution Equipment Technology Team","award":["2023JSSPD01"],"award-info":[{"award-number":["2023JSSPD01"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,3,22]]},"DOI":"10.1145\/3654823.3654890","type":"proceedings-article","created":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T16:20:33Z","timestamp":1716999633000},"page":"372-375","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Track Defect Detection Based on Improved Rtmdet"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-9502-5264","authenticated-orcid":false,"given":"Rong","family":"Fan","sequence":"first","affiliation":[{"name":"Hohai University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4043-0725","authenticated-orcid":false,"given":"Qi","family":"Sun","sequence":"additional","affiliation":[{"name":"Hohai University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8822-230X","authenticated-orcid":false,"given":"Qi","family":"He","sequence":"additional","affiliation":[{"name":"Hohai University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4133-0670","authenticated-orcid":false,"given":"Zhi","family":"Qiao","sequence":"additional","affiliation":[{"name":"Hohai University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8131-4879","authenticated-orcid":false,"given":"Hongzhu","family":"Chen","sequence":"additional","affiliation":[{"name":"Hohai University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8855-2961","authenticated-orcid":false,"given":"Wenqiang","family":"Zhao","sequence":"additional","affiliation":[{"name":"Hohai University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2619-581X","authenticated-orcid":false,"given":"Lin","family":"Ma","sequence":"additional","affiliation":[{"name":"Hohai University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3111-5504","authenticated-orcid":false,"given":"Yue","family":"Ning","sequence":"additional","affiliation":[{"name":"Hohai University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4467-7641","authenticated-orcid":false,"given":"Pengfei","family":"Shi","sequence":"additional","affiliation":[{"name":"Hohai University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-est.2020.0041"},{"issue":"7","key":"e_1_3_2_1_2_1","first-page":"188","article-title":"Multi task learning for track segmentation and intrusion detection","volume":"32","author":"Zhang S","year":"2023","unstructured":"Zhang S, Yang SY, Sun BY, Multi task learning for track segmentation and intrusion detection. Computer System Applications, 2023, 32 (7): 188-194","journal-title":"Computer System Applications"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2911015"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.21307\/ijssis-2017-271"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/app13127330"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2020.103303"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICET55676.2022.9824503"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00721"},{"key":"e_1_3_2_1_9_1","volume-title":"Research on Improved YOLO-V7 Steel Surface Defect Detection Algorithm. Mechanical Science and Technology","author":"Li W","year":"2023","unstructured":"Li W, Yao XM, Zhang PC, Research on Improved YOLO-V7 Steel Surface Defect Detection Algorithm. Mechanical Science and Technology, 2023, 1-10."},{"key":"e_1_3_2_1_10_1","volume-title":"RTMDet: An empirical study of designing real-time object detectors. arXiv preprint arXiv: 2212.07784","author":"Lyu C","year":"2022","unstructured":"Lyu C, Zhang W, Huang H, RTMDet: An empirical study of designing real-time object detectors. arXiv preprint arXiv: 2212.07784, 2022."},{"key":"e_1_3_2_1_11_1","volume-title":"Polarized self-attention: Towards high-quality pixel-wise regression. arXiv preprint arXiv: 2107.00782","author":"Liu H","year":"2021","unstructured":"Liu H, Liu F, Fan X, Polarized self-attention: Towards high-quality pixel-wise regression. arXiv preprint arXiv: 2107.00782, 2021."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2017.12.012"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.20944\/preprints202301.0463.v1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00140"},{"key":"e_1_3_2_1_15_1","volume-title":"Mish: A self regularized non-monotonic activation function. arXiv preprint arXiv","author":"Misra D.","year":"1908","unstructured":"Misra D. Mish: A self regularized non-monotonic activation function. arXiv preprint arXiv: 1908.08681, 2019."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Lin T Y Doll\u00e1r P Girshick R Feature pyramid networks for object detection[C]\/\/Proceedings of the IEEE conference on computer vision and pattern recognition. 2017: 2117-2125.","DOI":"10.1109\/CVPR.2017.106"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00913"},{"key":"e_1_3_2_1_18_1","volume-title":"Chen B","author":"Howard A G","year":"2017","unstructured":"Howard A G, Zhu M, Chen B, Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv: 1704.04861, 2017."},{"key":"e_1_3_2_1_19_1","first-page":"2","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2023","author":"Jia D","year":"1970","unstructured":"Jia D, Yuan Y, He H, Detrs with hybrid matching. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2023. 19702-19712."},{"key":"e_1_3_2_1_20_1","first-page":"0","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision, 2023","author":"Chen S","year":"1983","unstructured":"Chen S, Sun P, Song Y, Diffusiondet: Diffusion model for object detection. Proceedings of the IEEE\/CVF International Conference on Computer Vision, 2023. 19830-19843."},{"key":"e_1_3_2_1_21_1","volume-title":"Wang F","author":"Ge Z","year":"2021","unstructured":"Ge Z, Liu S, Wang F, Yolox: Exceeding yolo series in 2021. arXiv preprint arXiv: 2107.08430, 2021."}],"event":{"name":"CACML 2024: 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning","location":"Shanghai China","acronym":"CACML 2024"},"container-title":["Proceedings of the 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3654823.3654890","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3654823.3654890","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T15:17:05Z","timestamp":1755875825000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3654823.3654890"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,22]]},"references-count":21,"alternative-id":["10.1145\/3654823.3654890","10.1145\/3654823"],"URL":"https:\/\/doi.org\/10.1145\/3654823.3654890","relation":{},"subject":[],"published":{"date-parts":[[2024,3,22]]},"assertion":[{"value":"2024-05-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}