{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:41:37Z","timestamp":1775004097559,"version":"3.50.1"},"reference-count":19,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,2,1]]},"DOI":"10.1587\/transinf.2019edl8154","type":"journal-article","created":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T22:09:47Z","timestamp":1580508587000},"page":"454-458","source":"Crossref","is-referenced-by-count":16,"title":["A New GAN-Based Anomaly Detection (GBAD) Approach for Multi-Threat Object Classification on Large-Scale X-Ray Security Images"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Joanna Kazzandra","family":"DUMAGPI","sequence":"first","affiliation":[{"name":"Dept. of Electronics and Communications Engineering, Kwangwoon University"}]},{"given":"Woo-Young","family":"JUNG","sequence":"additional","affiliation":[{"name":"Dept. of Electronics and Communications Engineering, Kwangwoon University"}]},{"given":"Yong-Jin","family":"JEONG","sequence":"additional","affiliation":[{"name":"Dept. of Electronics and Communications Engineering, Kwangwoon University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] G. Zentai, \u201cX-ray imaging for homeland security,\u201d Proc. IEEE Int. Workshop Imaging Syst. Tech. (IST), Chania, Greece, pp.1-6, 2008. 10.1109\/ist.2008.4659929","DOI":"10.1109\/IST.2008.4659929"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] K. He, X. Zhang, S. Ren, and J. Sun, \u201cDeep Residual Learning for Image Recognition,\u201d Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), Las Vegas, NV, pp.770-778, 2016. 10.1109\/cvpr.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna, \u201cRethinking the Inception Architecture for Computer Vision,\u201d Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), Las Vegas, NV, pp.2818-2826, 2016. 10.1109\/cvpr.2016.308","DOI":"10.1109\/CVPR.2016.308"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] G. Huang, Z. Liu, L.V.D. Maaten, and K.Q. Weinberger, \u201cDensely Connected Convolutional Networks,\u201d Proc. IEEE Conf. Comput. Vis. Pattern Recognit (CVPR), Honolulu, HI, pp.2261-2269, 2017. 10.1109\/cvpr.2017.243","DOI":"10.1109\/CVPR.2017.243"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] D. Mery, E. Svec, M. Arias, V. Riffo, J.M. Saavedra, and S. Banarjee, \u201cModern Computer Vision Techniques for X-Ray Testing in Baggage Inspection,\u201d IEEE Trans. Syst., Man, Cybern. Syst., vol.47, no.4, pp.682-692, 2017. 10.1109\/tsmc.2016.2628381","DOI":"10.1109\/TSMC.2016.2628381"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] S. Ackay, M.E. Kundegorski, C.G. Willcocks, and T.P. Breckon, \u201cUsing Deep Convolutional Neural Network Architectures for Object Classification and Detection within X-Ray Baggage Security Imagery,\u201d IEEE Trans. Inf. Forensics Security, vol.13, no.9, pp.2203-2215, 2018. 10.1109\/tifs.2018.2812196","DOI":"10.1109\/TIFS.2018.2812196"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] H. He and E.A. Garcia, \u201cLearning from Imbalanced Data,\u201d IEEE Trans. Knowl. Data Eng., vol.21, no.9, pp.1263-1284, 2009. 10.1109\/tkde.2008.239","DOI":"10.1109\/TKDE.2008.239"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] C. Miao, L. Xie, F. Wan, C. Su, H. Liu, J. Jiao, and Q. Ye, \u201cSIXray: A large-scale security inspection x-ray benchmark for prohibited item discovery in overlapping images,\u201d Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), Long Beach, CA, 2019.","DOI":"10.1109\/CVPR.2019.00222"},{"key":"9","unstructured":"[9] I.J. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio, \u201cGenerative adversarial nets,\u201d Advances in Neural Information Processing, pp.2672-2680, 2014."},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] T. Schlegl, P. Seeb\u00f6ck, S.M. Waldstein, U. Schmidt-Erfurth, and G. Langs, \u201cUnsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery,\u201d Information Processing in Medical Imaging, 2017. 10.1007\/978-3-319-59050-9_12","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"11","unstructured":"[11] H. Zenati, C.-S. Foo, B. Lecouat, G. Manek, and V. Chandrasekhar, \u201cEfficient GAN-based anomaly detection,\u201d Int. Conf. Learning Representations (ICLR), 2018."},{"key":"12","unstructured":"[12] J. Donahue, P. Krahenbuhl, and T. Darrel, \u201cAdversarial feature learning,\u201d Int. Conf. Learning Representations (ICLR), 2017."},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] L.D. Griffin, M. Caldwell, J.T.A. Andrews, and H. Bohler, \u201c\u201cUnexpected Item in the Bagging Area\u201d: Anomaly Detection in X-Ray Security Images,\u201d IEEE Trans. Inf. Forensics Security, vol.14, no.6, pp.1539-1553, 2019. 10.1109\/tifs.2018.2881700","DOI":"10.1109\/TIFS.2018.2881700"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] T. Lin, P. Doll\u00e1r, R. Girshick, K. He, B. Hariharan, and S. Belongie, \u201cFeature Pyramid Networks for Object Detection,\u201d Proc. IEEE Conf. Comput. Vis. Pattern Recognit (CVPR), Honolulu, HI, pp.936-944, 2017. 10.1109\/cvpr.2017.106","DOI":"10.1109\/CVPR.2017.106"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] B.E. Boser, I.M. Guyon, and V.N. Vapnik, \u201cA training algorithm for optimal margin classifiers,\u201d Proc. 5th Annual Workshop Computational Learning Theory, pp.144-152, 1992. 10.1145\/130385.130401","DOI":"10.1145\/130385.130401"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] M. Everingham, L.V. Gool, C.K.I. Williams, J. Winn, and A. Zisserman, \u201cThe PASCAL Visual Object Classification (VOC) Challenge,\u201d Int. J. Comput. Vis., vol.88, no.2, pp.303-338, 2010. 10.1007\/s11263-009-0275-4","DOI":"10.1007\/s11263-009-0275-4"},{"key":"17","unstructured":"[17] A. Paszke, S. Gross, S. Chintala, G. Chanan, E. Yang, Z. DeVito, Z. Lin, A. Desmaison, L. Antiga, and A. Lerer, \u201cAutomatic differentiation in pytorch,\u201d NIPS Autodiff Workshop, 2017."},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] S. Ackay, A. Atapour-Abarghouei, and T.P. Breckon, \u201cGanomaly: Semi-supervised anomaly detection via adversarial training,\u201d in Asian Conf. Computer Vision (ACCV), pp.622-637, 2018. 10.1007\/978-3-030-20893-6_39","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] S. Ackay, A. Atapour-Abarghouei, and T.P. Breckon, \u201cSkip-GANomaly: Skip Connected and Adversarially Trained Encoder-Decoder Anomaly Detection,\u201d in Int. Joint Conf. Neural Networks (IJCNN), 2019. 10.1109\/ijcnn.2019.8851808","DOI":"10.1109\/IJCNN.2019.8851808"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/2\/E103.D_2019EDL8154\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T03:26:44Z","timestamp":1580527604000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/2\/E103.D_2019EDL8154\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,1]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019edl8154","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,1]]}}}