{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T07:01:15Z","timestamp":1764831675727,"version":"3.46.0"},"reference-count":41,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.067460","type":"journal-article","created":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T07:59:53Z","timestamp":1757318393000},"page":"2873-2891","source":"Crossref","is-referenced-by-count":0,"title":["Delving into End-to-End Dual-View Prohibited Item Detection for Security Inspection System"],"prefix":"10.32604","volume":"85","author":[{"given":"Zihan","family":"Jia","sequence":"first","affiliation":[]},{"given":"Bowen","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Dongyue","family":"Chen","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"11825","DOI":"10.1109\/TII.2024.3413316","article-title":"Delving into cluttered prohibited item detection for security inspection system","volume":"20","author":"Wang","year":"2024","journal-title":"IEEE Transact Indust Inform"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"3510","DOI":"10.1109\/TIFS.2024.3364368","article-title":"Dual-mode learning for multi-dataset X-ray security image detection","volume":"19","author":"Yang","year":"2024","journal-title":"IEEE Transact Inform Foren Secur"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"6563","DOI":"10.1109\/TII.2023.3348838","article-title":"Autonomous localization of X-ray baggage threats via weakly supervised learning","volume":"20","author":"Velayudhan","year":"2024","journal-title":"IEEE Transact Indust Inform"},{"key":"ref4","series-title":"2020 10th Institute of Electrical and Electronics Engineers International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER); 2020 Oct 10\u201313","first-page":"130","article-title":"Automatic annotation approach for prohibited item in X-ray image based on PANet","author":"Ma"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"2203","DOI":"10.1109\/TIFS.2018.2812196","article-title":"Using deep convolutional neural network architectures for object classification and detection within X-ray baggage security imagery","volume":"13","author":"Akcay","year":"2018","journal-title":"IEEE Transact Inform Foren Secur"},{"key":"ref6","series-title":"Proceedings of the 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition; 2019 Jun 15\u201320","first-page":"2119","article-title":"Sixray: a large-scale security inspection X-ray benchmark for prohibited item discovery in overlapping images","author":"Miao"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"4374","DOI":"10.1109\/TMM.2022.3174339","article-title":"Automated segmentation of prohibited items in X-ray baggage images using dense de-overlap attention snake","volume":"25","author":"Ma","year":"2022","journal-title":"IEEE Transact Multim"},{"key":"ref8","series-title":"Proceedings of the 28th ACM International Conference on Multimedia; 2020 Oct 12\u201316","first-page":"138","article-title":"Occluded prohibited items detection: an X-ray security inspection benchmark and de-occlusion attention module","author":"Wei"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1109\/TIFS.2022.3154287","article-title":"Detecting overlapped objects in X-ray security imagery by a label-aware mechanism","volume":"17","author":"Zhao","year":"2022","journal-title":"IEEE Transact Inform Foren Secu"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"108261","DOI":"10.1016\/j.patcog.2021.108261","article-title":"Exploiting foreground and background separation for prohibited item detection in overlapping X-Ray images","volume":"122","author":"Shao","year":"2022","journal-title":"Pattern Recognit"},{"key":"ref11","unstructured":"Hassan T, Akcay S, Bennamoun M, Khan S, Werghi N. Cascaded structure tensor framework for robust identification of heavily occluded baggage items from X-ray scans. arXiv:2004.06780. 2020."},{"key":"ref12","series-title":"Proceedings of the 2021 IEEE\/CVF International Conference on Computer Vision; 2021 Oct 10\u201317","first-page":"5412","article-title":"Towards real-world prohibited item detection: a large-scale X-ray benchmark","author":"Wang"},{"key":"ref13","series-title":"Proceedings of the 2021 IEEE\/CVF International Conference on Computer Vision; 2021 Oct 10\u201317","first-page":"10923","article-title":"Towards real-world X-ray security inspection: a high-quality benchmark and lateral inhibition module for prohibited items detection","author":"Tao"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.neucom.2022.11.034","article-title":"Occluded prohibited object detection in X-ray images with global context-aware multi-scale feature aggregation","volume":"519","author":"Ma","year":"2023","journal-title":"Neurocomputing"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"4505312","DOI":"10.1109\/TIM.2024.3394483","article-title":"Forknet: overlapping image disentanglement for accurate prohibited item detection","volume":"73","author":"Jia","year":"2024","journal-title":"IEEE Trans Instrum Meas"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"2270","DOI":"10.1109\/LSP.2024.3451311","article-title":"X-YOLO: an efficient detection network of dangerous objects in X-ray baggage images","volume":"31","author":"Cheng","year":"2024","journal-title":"IEEE Signal Process Lett"},{"key":"ref17","unstructured":"Bhowmik N, Wang Q, Gaus YFA, Szarek M, Breckon TP. The good, the bad and the ugly: evaluating convolutional neural networks for prohibited item detection using real and synthetically composited X-ray imagery. arXiv:1909.11508. 2019. doi:10.48550\/arXiv.1909.11508."},{"key":"ref18","series-title":"Proceedings of the 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition; 2023 Jun 17\u201324","first-page":"524","article-title":"Seeing through the data: a statistical evaluation of prohibited item detection benchmark datasets for X-ray security screening","author":"Isaac-Medina"},{"key":"ref19","series-title":"2020 25th International Conference on Pattern Recognition (ICPR)","first-page":"9889","article-title":"Multi-view object detection using epipolar constraints within cluttered x-ray security imagery","author":"Isaac-Medina","year":"2021"},{"key":"ref20","series-title":"Chinese Conference on Pattern Recognition and Computer Vision (PRCV)","first-page":"721","article-title":"Dualray: dual-view X-ray security inspection benchmark and fusion detection framework","author":"Wu","year":"2022"},{"key":"ref21","first-page":"1063203","volume":"10632","author":"Liang","year":"2018","journal-title":"Anomaly detection and imaging with X-rays (ADIX) III"},{"key":"ref22","series-title":"2020 International Joint Conference on Neural Networks (IJCNN); 2020 Jul 19\u201324","first-page":"1","article-title":"On the evaluation of prohibited item classification and detection in volumetric 3d computed tomography baggage security screening imagery","author":"Wang"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"3866","DOI":"10.1109\/TIFS.2024.3372797","article-title":"Toward dual-view X-ray baggage inspection: a large-scale benchmark and adaptive hierarchical cross refinement for prohibited item discovery","volume":"19","author":"Ma","year":"2024","journal-title":"IEEE Transact Inform Foren Secur"},{"key":"ref24","unstructured":"Hong S, Zhou Y, Xu W. A multi-scale feature fusion framework integrating frequency domain and cross-view attention for dual-view X-ray security inspections. arXiv:2502.01710. 2025. doi:10.48550\/arXiv:2502.01710v2."},{"key":"ref25","doi-asserted-by":"crossref","unstructured":"Tao R, Wang H, Guo Y, Chen H, Zhang L, Liu X, et al. Dual-view X-ray detection: can AI detect prohibited items from dual-view X-ray images like humans? arXiv:2411.18082. 2024.doi:10.48550\/arXiv:2411.18082.","DOI":"10.1109\/CVPR52734.2025.00967"},{"key":"ref26","series-title":"Proceedings of the 2018 European Conference on Computer Vision (ECCV)","first-page":"3","article-title":"Cbam: convolutional block attention module","author":"Woo","year":"2018"},{"key":"ref27","series-title":"International Conference on Machine Learning","first-page":"11863","article-title":"Simam: a simple, parameter-free attention module for convolutional neural networks","author":"Yang","year":"2021"},{"key":"ref28","series-title":"Proceedings of the 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition; 2021 Jun 20\u201325","first-page":"13713","article-title":"Coordinate attention for efficient mobile network design","author":"Hou"},{"key":"ref29","series-title":"Proceedings of the 2015 IEEE International Conference on Computer Vision; 2015 Dec 7\u201313","first-page":"945","article-title":"Multi-view convolutional neural networks for 3d shape recognition","author":"Su"},{"key":"ref30","series-title":"Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition; 2018 Jun 18\u201323","first-page":"264","article-title":"Gvcnn: group-view convolutional neural networks for 3D shape recognition","author":"Feng"},{"key":"ref31","series-title":"Proceedings of the 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition; 2019 Jun 15\u201320","first-page":"10394","article-title":"Deep supervised cross-modal retrieval","author":"Zhen"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIP.2020.3039378","article-title":"DRCNN: dynamic routing convolutional neural network for multi-view 3D object recognition","volume":"30","author":"Sun","year":"2020","journal-title":"IEEE Transact Image Process"},{"key":"ref33","unstructured":"Federici M, Dutta A, Forr\u00e9 P, Kushman N, Akata Z. Learning robust representations via multi-view information bottleneck. arXiv:2002.07017. 2020."},{"key":"ref34","doi-asserted-by":"crossref","first-page":"1137","DOI":"10.1109\/TPAMI.2016.2577031","article-title":"Faster R-CNN: towards real-time object detection with region proposal networks","volume":"39","author":"Ren","year":"2016","journal-title":"IEEE Transact Pattern Analy Mach Intell"},{"key":"ref35","series-title":"Proceedings of the 2019 IEEE\/CVF International Conference on Computer Vision; 2019 Oct 27\u2013Nov 2","first-page":"9627","article-title":"Fcos: fully convolutional one-stage object detection","author":"Tian"},{"key":"ref36","series-title":"Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition; 2016 Jun 27\u201330","first-page":"770","article-title":"Deep residual learning for image recognition","author":"He"},{"key":"ref37","series-title":"Proceedings of the 2019 IEEE\/CVF International Conference on Computer Vision; 2019 Oct 27\u2013Nov 2","first-page":"4471","article-title":"Free-form image inpainting with gated convolution","author":"Yu"},{"key":"ref38","series-title":"Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition; 2020 Jun 13\u201319","first-page":"9759","article-title":"Bridging the gap between anchor-based and anchor-free detection via adaptive training sample selection","author":"Zhang"},{"key":"ref39","series-title":"Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition; 2018 Jun 18\u201323","first-page":"6154","article-title":"Cascade R-CNN: delving into high quality object detection","author":"Cai"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"2865","DOI":"10.1007\/s00371-022-02498-y","article-title":"Material-aware Cross-channel Interaction Attention (MCIA) for occluded prohibited item detection","volume":"39","author":"Wang","year":"2023","journal-title":"Visual Comput"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"3170","DOI":"10.1007\/s11263-023-01855-1","article-title":"Pidray: a large-scale X-ray benchmark for real-world prohibited item detection","volume":"131","author":"Zhang","year":"2023","journal-title":"Int J Comput Vis"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-2\/TSP_CMC_67460\/TSP_CMC_67460.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T05:35:38Z","timestamp":1764826538000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n2\/63825"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":41,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.067460","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}