{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:10:02Z","timestamp":1755882602854,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1145\/3672919.3672985","type":"proceedings-article","created":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T12:39:43Z","timestamp":1721824783000},"page":"358-364","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on defect detection method of overhead line insulator based on MACE-YOLO"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7859-019X","authenticated-orcid":false,"given":"Qiang","family":"Zhang","sequence":"first","affiliation":[{"name":"Faculty of Electrical anf Control Engineering, Liaoning Technical University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5479-6066","authenticated-orcid":false,"given":"Shanjie","family":"Li","sequence":"additional","affiliation":[{"name":"Faculty of Electrical anf Control Engineering, Liaoning Technical University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4445-0697","authenticated-orcid":false,"given":"Ying","family":"Li","sequence":"additional","affiliation":[{"name":"Faculty of Electrical anf Control Engineering, Liaoning Technical University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7482-8871","authenticated-orcid":false,"given":"Dongdong","family":"Feng","sequence":"additional","affiliation":[{"name":"Faculty of Electrical anf Control Engineering, Liaoning Technical University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,24]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.4236\/jpee.2016.43005"},{"key":"e_1_3_2_1_2_1","first-page":"2022","author":"Liu J","year":"2022","unstructured":"Liu J, Liu C, Wu Y, Insulators\u2019 Identification and Missing Defect Detection in Aerial Images Based on Cascaded YOLO Models[J]. Computational Intelligence and Neuroscience, 2022, 2022.","journal-title":"Computational Intelligence and Neuroscience"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/ACCESS.2020.2982288"},{"key":"e_1_3_2_1_4_1","volume-title":"Self-explosion defect detection method of glass insulator based on improved generative adversarial network. High Volt. Eng","author":"Wang D.","year":"2022","unstructured":"Wang, D.; Sun, J.; Zhang, T. Self-explosion defect detection method of glass insulator based on improved generative adversarial network. High Volt. Eng. 2022, 48, 1096\u20131103."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1016\/j.egyr.2022.03.160"},{"key":"e_1_3_2_1_6_1","first-page":"5","volume-title":"Proceedings of the 4th International Conference on Applied Robotics for the Power Industry (CARPI)","author":"Zhang F.","year":"2016","unstructured":"Zhang, F.; Wang, W.; Zhao, Y. Automatic diagnosis system of transmission line abnormalities and defects based on UAV. In Proceedings of the 4th International Conference on Applied Robotics for the Power Industry (CARPI), Jinan, China, 11\u201313 October 2016; pp. 1\u20135."},{"volume-title":"Recognition and Computer Vision: 5th Chinese Conference, PRCV 2022, Shenzhen, China, November 4\u20137, 2022, 2022, Proceedings, Part IV. Cham: Springer Nature Switzerland","author":"Wu Y","unstructured":"Wu Y, Zeng Q, Li P, Identification of Bird's Nest Hazard Level of Transmission Line Based on Improved Yolov5 and Location Constraints[C]\/\/Pattern Recognition and Computer Vision: 5th Chinese Conference, PRCV 2022, Shenzhen, China, November 4\u20137, 2022, 2022, Proceedings, Part IV. Cham: Springer Nature Switzerland, 2022: 412-425.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","volume-title":"Pin Defect Detection of Transmission Line Based on Improved SSD. High Volt. Eng","author":"Li R.","year":"2021","unstructured":"Li, R.; Zhang, Y.; Zhai, D. Pin Defect Detection of Transmission Line Based on Improved SSD. High Volt. Eng. 2021, 47, 3795\u20133802."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/TIM.2020.3044719"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.3390\/app10186147"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/DDCLS52934.2021.9455519"},{"key":"e_1_3_2_1_12_1","volume-title":"Insulator detection and damage identification based on improved lightweight YOLOv4 network.\u00a0Energy Rep","author":"Han G.","year":"2021","unstructured":"Han, G.; He, M.; Zhao, F. Insulator detection and damage identification based on improved lightweight YOLOv4 network.\u00a0Energy Rep. 2021, 7, 187\u2013197."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/TPWRD.2019.2944741"},{"key":"e_1_3_2_1_14_1","volume-title":"A lightweight YOLOv4-Based forestry pest detection method using coordinate attention and feature fusion. Entropy","author":"Zha M.","year":"2021","unstructured":"Zha, M.; Qian, W.; Yi, W.; Hua, J. A lightweight YOLOv4-Based forestry pest detection method using coordinate attention and feature fusion. Entropy 2021, 23,1587."},{"key":"e_1_3_2_1_15_1","volume-title":"Insulator Breakage Detection Based on Improved YOLOv5. Sustainability","author":"Han G.","year":"2022","unstructured":"Han, G.; He, M.; Gao, M.; Yu, J.; Liu, K.; Qin, L. Insulator Breakage Detection Based on Improved YOLOv5. Sustainability 2022, 14, 6066."}],"event":{"acronym":"CSAIDE 2024","name":"CSAIDE 2024: 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy","location":"Nanjing China"},"container-title":["Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672919.3672985","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672919.3672985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:35:30Z","timestamp":1755880530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672919.3672985"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":15,"alternative-id":["10.1145\/3672919.3672985","10.1145\/3672919"],"URL":"https:\/\/doi.org\/10.1145\/3672919.3672985","relation":{},"subject":[],"published":{"date-parts":[[2024,3]]},"assertion":[{"value":"2024-07-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}