{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:07:40Z","timestamp":1761664060815,"version":"3.37.3"},"reference-count":42,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,5,11]],"date-time":"2020-05-11T00:00:00Z","timestamp":1589155200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012294","name":"National Social Science Fund Youth Project","doi-asserted-by":"publisher","award":["17BGL102","15SYC-043","KX15-B-01","2015ZX18"],"award-info":[{"award-number":["17BGL102","15SYC-043","KX15-B-01","2015ZX18"]}],"id":[{"id":"10.13039\/501100012294","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Excellent Project of Jiangsu Province Social Science Union","award":["17BGL102","15SYC-043","KX15-B-01","2015ZX18"],"award-info":[{"award-number":["17BGL102","15SYC-043","KX15-B-01","2015ZX18"]}]},{"name":"Soft Science Research of Wuxi Science and Technology Association","award":["17BGL102","15SYC-043","KX15-B-01","2015ZX18"],"award-info":[{"award-number":["17BGL102","15SYC-043","KX15-B-01","2015ZX18"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["17BGL102","15SYC-043","KX15-B-01","2015ZX18"],"award-info":[{"award-number":["17BGL102","15SYC-043","KX15-B-01","2015ZX18"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Scientific Programming"],"published-print":{"date-parts":[[2020,5,11]]},"abstract":"<jats:p>With the rapid development of Internet technology, live broadcast industry has also flourished. However, in the public network live broadcast platform, live broadcast security issues have become increasingly prominent. The detection of suspected pornographic videos in live broadcast platforms is still in the manual detection stage, that is, through the supervision of administrators and user reports. At present, there are many online live broadcast platforms in China. In mainstream live streaming platforms, the number of live broadcasters at the same time can reach more than 100,000 people\/times. Only through manual detection, there are a series of problems such as low efficiency, poor pertinence, and slow progress. This approach is obviously not up to the task requirements of real-time network supervision. For the identification of whether live broadcasts on the Internet contain pornographic content, a deep neural network model based on residual networks (ResNet-50) is proposed to detect pictures and videos in live broadcast platforms. The core idea of detection is to classify each image in the video into two categories: (1) pass and (2) violation. The experiments verify that the network proposed can heighten the efficiency of pornographic detection in webcasts. The detection method proposed in this article can improve the accuracy of detection on the one hand and can standardize the detection indicators in the detection process on the other. These detection indicators have a certain promotion effect on the classification of pornographic videos.<\/jats:p>","DOI":"10.1155\/2020\/1895341","type":"journal-article","created":{"date-parts":[[2020,5,11]],"date-time":"2020-05-11T23:35:48Z","timestamp":1589240148000},"page":"1-12","source":"Crossref","is-referenced-by-count":6,"title":["Violation Detection of Live Video Based on Deep Learning"],"prefix":"10.1155","volume":"2020","author":[{"given":"Chao","family":"Yuan","sequence":"first","affiliation":[{"name":"College of Economics and Management, Nanjing University of Aeronautics and Astronautics, 29 Jiangjun Avenue, Nanjing 211100, China"},{"name":"School of Design, Jiangnan University, 1800 Lihu Avenue, Wuxi, Jiangsu 214122, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1362-6008","authenticated-orcid":true,"given":"Jie","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Economics and Management, Nanjing University of Aeronautics and Astronautics, 29 Jiangjun Avenue, Nanjing 211100, China"},{"name":"Nanjing University of the Arts, No. 74 Beijing West Road, Nanjing, Jiangsu 210013, China"}]}],"member":"311","reference":[{"issue":"3","key":"1","first-page":"547","volume":"25","year":"2019","journal-title":"Intelligent Automation and Soft Computing (Autosoft)"},{"issue":"3","key":"2","first-page":"755","volume":"20","year":"2019","journal-title":"Journal of Internet Technology (JIT)"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1557-3"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-02200-6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2956827"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2019.2947482"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2932058"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2908982"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2923459"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01245-3"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2882452"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.3390\/rs11111265"},{"first-page":"10191","volume-title":"A method for early pruning a branch of candidates in the process of mining sequential patterns, intelligent information and database systems, ACIIDS 2017","year":"2017","key":"15"},{"issue":"6","key":"16","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1007\/s10994-016-5617-1","volume":"106","year":"2017","journal-title":"Machine Learning"},{"issue":"1","key":"17","first-page":"181","volume":"46","year":"2015","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"5","key":"18","first-page":"1123","volume":"28","year":"2016","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.05.018"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.08.093"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2015.08.009"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2825352"},{"issue":"3","key":"23","doi-asserted-by":"crossref","first-page":"672","DOI":"10.1109\/TSMCB.2011.2172604","volume":"42","year":"2012","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/tnsre.2017.2748388"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/tfuzz.2016.2637405"},{"issue":"4","key":"26","first-page":"688","volume":"45","year":"2014","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"3","key":"27","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1109\/TCYB.2014.2330844","volume":"45","year":"2015","journal-title":"IEEE Transactions on Cybernetics"},{"key":"29","first-page":"45","volume":"3656","year":"1999","journal-title":"SPIE Storage and Retrieval for Image and Video Database"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1023\/a:1013200319198"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.7903\/ijecs.1408"},{"issue":"2","key":"32","first-page":"47","volume":"1","year":"2011","journal-title":"Signal & Image Processing"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.4018\/jdcf.2013010103"},{"year":"2013","key":"37"},{"first-page":"1097","volume-title":"Imagenet classsificaton with deep convolution neural networks","year":"2012","key":"38"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.07.012"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.12.017"},{"year":"1995","key":"42"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.3390\/brainsci9090212"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2903876"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1111\/trf.14639"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1002\/aic.15347"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2946264"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.05.019"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2018.01.003"}],"container-title":["Scientific Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2020\/1895341.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2020\/1895341.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2020\/1895341.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,11]],"date-time":"2020-05-11T23:36:10Z","timestamp":1589240170000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/sp\/2020\/1895341\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,11]]},"references-count":42,"alternative-id":["1895341","1895341"],"URL":"https:\/\/doi.org\/10.1155\/2020\/1895341","relation":{},"ISSN":["1058-9244","1875-919X"],"issn-type":[{"type":"print","value":"1058-9244"},{"type":"electronic","value":"1875-919X"}],"subject":[],"published":{"date-parts":[[2020,5,11]]}}}