{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:28Z","timestamp":1750309348433,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T00:00:00Z","timestamp":1720742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,12]]},"DOI":"10.1145\/3686490.3686502","type":"proceedings-article","created":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T16:29:37Z","timestamp":1728664177000},"page":"82-87","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Deep learning-based method for recognizing violation behaviors of underground personnel"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5583-0074","authenticated-orcid":false,"given":"Tian","family":"Ma","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Xi'an University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3252-4835","authenticated-orcid":false,"given":"Wenna","family":"Zhu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Xi'an University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0717-853X","authenticated-orcid":false,"given":"Weilu","family":"Shi","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Xi'an University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7035-3075","authenticated-orcid":false,"given":"Jiahui","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Xi'an University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9185-9974","authenticated-orcid":false,"given":"Yuancheng","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Xi'an University of Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Human Activity Recognition Using Visual Object Detectio-n[C]\/\/2019 IEEE 2nd Wireless Africa Conference","author":"Aienaar S W","year":"2019","unstructured":"Aienaar S W, Malekian R. Human Activity Recognition Using Visual Object Detectio-n[C]\/\/2019 IEEE 2nd Wireless Africa Conference, 2019: 1-5."},{"issue":"4","key":"e_1_3_2_1_2_1","first-page":"92","article-title":"AI identification technology in intelligent coal mine[J]","volume":"55","author":"Minghua MA","year":"2023","unstructured":"SHEN Minghua, MA Kun, YANG Yang, Application of AI identification technology in intelligent coal mine[J]. Coal Engineering, 2023, 55(4): 92-97","journal-title":"Coal Engineering"},{"issue":"6","key":"e_1_3_2_1_3_1","first-page":"1375","article-title":"Underground Personnel Personnel Behavior Pattern Recognition Model Based on CNN-LSTM[J].","volume":"53","author":"Lizhen ZHANG","year":"2023","unstructured":"CUI Lizhen,ZHANG Qingyu,GUO Qianqian,et al. Underground Personnel Personnel Behavior Pattern Recognition Model Based on CNN-LSTM[J].Radio Engineering, 2023, 53(6): 1375-1381","journal-title":"Radio Engineering"},{"key":"e_1_3_2_1_4_1","volume-title":"Long short-term memory[J]. Neural computation","author":"Hochreiter S","year":"1997","unstructured":"Hochreiter S, Schmidhuber J. Long short-term memory[J]. Neural computation, 1997, 9(8): 1735-1780."},{"key":"e_1_3_2_1_5_1","volume-title":"Systems and Computers","author":"Shi Xiaonan","year":"2022","unstructured":"Shi Xiaonan,Huang Jian,Huang Bo. An Underground Abnormal Behavior Recognition Method Based on an Optimized Alphapose-ST-GCN[J]. Journal of Circuits, Systems and Computers, 2022, 31(12)."},{"key":"e_1_3_2_1_6_1","volume-title":"Sustainability","author":"Cao Xiangang","year":"2023","unstructured":"Cao Xiangang,Zhang Chiyu,Wang Peng,Wei Hengyang,Huang Shikai,Li Hu. Unsafe Mining Behavior Identification Method Based on an Improved ST-GCN[J]. Sustainability, 2023, 15(2)."},{"issue":"7","key":"e_1_3_2_1_7_1","first-page":"95","article-title":"Mine personnel behavior recognition algorithm based on 3D\u2212Attention and multi-scale[J]","volume":"42","author":"Zhanli QUAN","year":"2023","unstructured":"LI Zhanli, QUAN Jincheng, JIN Hongmei. Mine personnel behavior recognition algorithm based on 3D\u2212Attention and multi-scale[J]. Foreign Electronic Measurement Technology, 2023, 42(7): 95-104.","journal-title":"Foreign Electronic Measurement Technology"},{"issue":"3","key":"e_1_3_2_1_8_1","first-page":"41","article-title":"Identification of miners' unsafe behaviors based on transfer learning and residual network[J]","volume":"30","author":"Tingxin WANG","year":"2020","unstructured":"WEN Tingxin, WANG Guitong, KONG Xiangbo, et al. Identification of miners' unsafe behaviors based on transfer learning and residual network[J]. China Safety Science Journal, 2020, 30(3): 41-46.","journal-title":"China Safety Science Journal"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"He K Zhang X Ren S Deep residual learning for image recognition[C]\/\/Proceedings of the IEEE conference on computer vision and pattern recognition. 2016: 770-778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Chollet F. Xception: Deep learning with depthwise separable convolutions[C]\/\/Proceedings of the IEEE conference on computer vision and pattern recognition. 2017: 1251-1258.","DOI":"10.1109\/CVPR.2017.195"},{"key":"e_1_3_2_1_11_1","volume-title":"Huang L","author":"Huang Z","year":"2019","unstructured":"Huang Z, Wang X, Huang L, Ccnet: Criss-cross attention for semantic segmentation[C]. roceedings of the IEEE\/CVF international conference on computer vision. 2019: 603-612."},{"key":"e_1_3_2_1_12_1","volume-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift[C]\/\/International conference on machine learning. pmlr","author":"Ioffe S","year":"2015","unstructured":"Ioffe S, Szegedy C. Batch normalization: Accelerating deep network training by reducing internal covariate shift[C]\/\/International conference on machine learning. pmlr, 2015: 448- 456."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"DU Tran LUBOMIR Bourdev ROB Fergus et al.Learning spatio temporal features with3d convolutional networks[C].Proceedings of the IEEE international conference on computer vision.2015:4489-4497.","DOI":"10.1109\/ICCV.2015.510"},{"key":"e_1_3_2_1_14_1","volume-title":"Temporal segment networks for action recognition in videos[J]","author":"Wang L","year":"2018","unstructured":"Wang L, Xiong Y, Wang Z, Temporal segment networks for action recognition in videos[J]. IEEE transactions on pattern analysis and machine intelligence, 2018, 41(11): 2740-2755."},{"key":"e_1_3_2_1_15_1","volume-title":"Is space-time attention all you need for video understanding?[C]\/\/ICML","author":"Bertasius G","year":"2021","unstructured":"Bertasius G, Wang H, Torresani L. Is space-time attention all you need for video understanding?[C]\/\/ICML. 2021, 2(3): 4."}],"event":{"name":"SPML 2024: 2024 7th International Conference on Signal Processing and Machine Learning","acronym":"SPML 2024","location":"Qingdao China"},"container-title":["Proceedings of the 2024 7th International Conference on Signal Processing and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686490.3686502","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3686490.3686502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:05:39Z","timestamp":1750291539000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686490.3686502"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,12]]},"references-count":15,"alternative-id":["10.1145\/3686490.3686502","10.1145\/3686490"],"URL":"https:\/\/doi.org\/10.1145\/3686490.3686502","relation":{},"subject":[],"published":{"date-parts":[[2024,7,12]]},"assertion":[{"value":"2024-10-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}