• Laser & Optoelectronics Progress
  • Vol. 59, Issue 2, 0210011 (2022)
Wen Wang1, Yatong Zhou1、*, Baojun Shi2, Hao He1, and Jianwei Zhang1
Author Affiliations
  • 1School of Electronic Information Engineering, Hebei University of Technology, Tianjin 300401, China
  • 2School of Mechanical Engineering, Hebei University of Technology, Tianjin 300401, China
  • show less
    DOI: 10.3788/LOP202259.0210011 Cite this Article Set citation alerts
    Wen Wang, Yatong Zhou, Baojun Shi, Hao He, Jianwei Zhang. Recognition Algorithm of Dangerous Goods in Security Inspection Based on Multi-Layer Attention Mechanism[J]. Laser & Optoelectronics Progress, 2022, 59(2): 0210011 Copy Citation Text show less
    References

    [1] Lin K Y, Wu J H, Xu L H. A survey on color image segmentation techniques[J]. Journal of Image and Graphics, 10, 1-10(2005).

    [2] Duan R L, Li Q X, Li Y H. Summary of image edge detection[J]. Optical Technique, 31, 415-419(2005).

    [3] Jia X Y, Li T T, Jiang Z H et al. Hue preserving low illumination image enhancement based on gene expression programming optimization[J]. Laser & Optoelectronics Progress, 56, 091502(2019).

    [4] Yang X G, Yang L R. A method on X-ray security image enhancement[J]. Computerized Tomography Theory and Applications, 21, 705-712(2012).

    [5] Zheng L T, Dong Y S, Shi H L. X-ray security inspection image enhancement algorithm based on MSR and fusion theory[J]. Video Engineering, 39, 34-37(2015).

    [6] Zhao G C, Zhang L, Wu F B. Application of improved median filtering algorithm to image de-noising[J]. Journal of Applied Optics, 32, 678-682(2011).

    [7] Luan L H, Ji G L. The study on decision tree classification techniques[J]. Computer Engineering, 30, 94-96, 105(2004).

    [8] Ding S F, Qi B J, Tan H Y. An overview on theory and algorithm of support vector machines[J]. Journal of University of Electronic Science and Technology of China, 40, 2-10(2011).

    [9] Lowe D G. Distinctive image features from scale-invariant keypoints[J]. International Journal of Computer Vision, 60, 91-110(2004).

    [10] Bastan M, Yousefi M R, Breuel T M. Visual words on baggage X-Ray images[M]. Real P, Diaz-Pernil D, Molina-Abril H, et al. Computer analysis of images and patterns, 6854, 360-368(2011).

    [11] Mery D, Riffo V, Zscherpel U et al. GDXray: the database of X-ray images for nondestructive testing[J]. Journal of Nondestructive Evaluation, 34, 1-12(2015).

    [12] LeCun Y, Bengio Y, Hinton G. Deep learning[J]. Nature, 521, 436-444(2015).

    [13] Wang J X, Lei Z C. A convolutional neural network based on feature fusion for face recognition[J]. Laser & Optoelectronics Progress, 57, 101508(2020).

    [14] Tong Y, Yang H C. Real-time traffic sign detection method based on improved convolution neural network[J]. Laser & Optoelectronics Progress, 56, 071003(2019).

    [15] Zhu M K, Lu X L. Human action recognition algorithm based on Bi-LSTM-Attention model[J]. Laser & Optoelectronics Progress, 56, 151503(2019).

    [16] Huang Y W, Wan C L, Feng H. Multi-feature fusion human behavior recognition algorithm based on convolutional neural network and long short term memory neural network[J]. Laser & Optoelectronics Progress, 56, 071505(2019).

    [17] Akçay S, Kundegorski M E, Devereux M et al. Transfer learning using convolutional neural networks for object classification within X-ray baggage security imagery[C], 1057-1061(2016).

    [18] Krizhevsky A, Sutskever I, Hinton G E. ImageNet classification with deep convolutional neural networks[J]. Communications of the ACM, 60, 84-90(2017).

    [19] Mery D, Svec E, Arias M et al. Modern computer vision techniques for X-ray testing in baggage inspection[J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 47, 682-692(2017).

    [20] Miao C J, Xie L X, Wan F et al. SIXray: a large-scale security inspection X-ray benchmark for prohibited item discovery in overlapping images[C], 2114-2123(2019).

    [21] Cheng D C, Meng G F, Cheng G L et al. SeNet: structured edge network for sea-land segmentation[J]. IEEE Geoscience and Remote Sensing Letters, 14, 247-251(2017).

    [22] Woo S, Park J, Lee J Y et al. CBAM: convolutional block attention module[M]. Ferrari V, Hebert M, Sminchisescu C, et al. Computer vision-ECCV 2018, 11211, 3-19(2018).

    [23] Krause J, Sapp B, Howard A et al. The unreasonable effectiveness of noisy data for fine-grained recognition[M]. Leibe B, Matas J, Sebe N, et al. Computer vision-ECCV 2016, 9907, 301-320(2016).

    [24] Wang F, Jiang M Q, Qian C et al. Residual attention network for image classification[C], 6450-6458(2017).

    [25] Zhang Z, Sabuncu M. Generalized cross entropy loss for training deep neural networks with noisy labels[C], 8792-8802(2018).

    [26] Simonyan K, Zisserman A. Very deep convolutional networks for large-scale image recognition[EB/OL]. https://arxiv.org/abs/1409.1556

    [27] Szegedy C, Vanhoucke V, Ioffe S et al. Rethinking the inception architecture for computer vision[C], 2818-2826(2016).

    [28] He K M, Zhang X Y, Ren S Q et al. Deep residual learning for image recognition[C], 770-778(2016).

    [29] Huang G, Liu Z, van der Maaten L et al. Densely connected convolutional networks[C], 2261-2269(2017).

    Wen Wang, Yatong Zhou, Baojun Shi, Hao He, Jianwei Zhang. Recognition Algorithm of Dangerous Goods in Security Inspection Based on Multi-Layer Attention Mechanism[J]. Laser & Optoelectronics Progress, 2022, 59(2): 0210011
    Download Citation