Computer Science ›› 2021, Vol. 48 ›› Issue (11): 268-275.doi: 10.11896/jsjkx.200900098
• Computer Graphics & Multimedia • Previous Articles Next Articles
JIN Yu-fang, WU Xiang, DONG Hui, YU Li, ZHANG Wen-an
CLC Number:
[1]ZHANG P,SONG Y F,ZONG L B,et al.Advances in 3D Object Detection:A Brief Survey[J].Computer Science,2020,47(4):94-102. [2]LIN J,DANG W C,PAN L H,et al.Safety Helmet Detection Based on YOLO[J].Computer Systems & Applications,2019,28(9):174-179. [3]FANG M,SUN T T,SHAO Z.Fast Helmet-wearing-condition Detection Based on Improved YOLO v2[J].Optics and Precision Engineering,2019,27(5):1196-1205. [4]LIU W,ANGUELOV D,ERHAN D,et al.SSD:Single ShotMultiBox Detector[C]//European Conference on Computer Vision,Amsterdam.Netherlands,2016:21-37. [5]WANG H L,QI X L,WU G S.Research Progress of Object Detection Technology Based on Convolutional Neural Network in Deep Learning[J].Computer Science,2018,45(9):11-19. [6]GIRSHICK R,DONAHUE J,DARRELLAND T,et al.RichFeature Hierarchies for Object Detection and Semantic Segmentation[C]//IEEE Conference on Computer Vision and Pattern Recognition,Columbus,OH.IEEE,2014:580-587. [7]GIRSHICK R.Fast R-CNN[C]//International Conference on Computer Vision.IEEE,2015:1440-1448. [8]REN S,HE K,GIRSHICK R,et al.Faster R-CNN:Towards Real-time Object Detection with Region Proposal Networks[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2017,39(6):1137-1149. [9]DAI J F,LI Y,HE K M,et al.R-FCN:Object Detection via Region-based Fully Convolutional Networks[C]//Conference and Workshop on Neural Information Processing Systems(NIPS).Barcelona,SPAIN,2016:379-387. [10]REDMON J,DIVVALA S,GIRSHICK R,et al.You Only Look Once:Unified,Real-time Object Detection[C]//IEEE Confe-rence on Computer Vision and Pattern Recognition,Las Vegas,NV.IEEE,2016:779-788. [11]REDMON J,FARHADI A.YOLO9000:Better,Faster,Stronger[C]//IEEE Conference on Computer Vision and Pattern Recognition,Honolulu,HI.IEEE,2017:6517-6525. [12]REDMON J,FARHADI A.YOLOv3:An Incremental Improvement[C]//IEEE Conference on Computer Vision and Pattern Recognition.Salt Lake City,UT,2018. [13]BOCHKOVSKIY A,WANG C Y,LIAO H Y.YOLO v4:Optimal Speed and Accuracy of Object Detection[J].arXiv:2004.10934v1,2020. [14]LIN T Y,GOYAL P,GIRSHICK R,et al.Focal Loss for Dense Object Detection[C]//2017 IEEE International Conference on Computer Vision (ICCV).Venice,2017:2999-3007. [15]DUAN K,BAI S,XIE L,et al.CenterNet:Keypoint Triplets for Object Detection[C]//Proceedings of the IEEE International Conference on Computer Vision (ICCV).Seoul,Korea (South),2019:6569-6578. [16]LAW H,DENG J.CornerNet:Detecting Objects as Paired Keypoints[C]//Proceedings of the European Conference on Computer Vision (ECCV).2018:734-750. [17]LAW H,TENG Y,RUSSAKOVSKY O,et al.CornerNet-Lite:Efficient Keypoint Based Object Detection[J].arXiv:1904.08900,2019. [18]TIAN Z,SHEN C,CHEN H,et al.FCOS:Fully Convolutional One-Stage Object Detection[C]//2019 IEEE/CVF International Conference on Computer Vision (ICCV).Seoul,Korea (South),2020:9627-9636. [19]YANG L Q,CAI L Q,GU S.Detection on Wearing Behavior of Safety Helmet Based on Machine Learning Method[J].Journal of Safety Science and Technology,2019,15(10):152-157. [20]LONG X T,CUI W P,ZHENG Z.Safety Helmet Wearing Detection Based on Deep Learning[C]//2019 IEEE 3rd Information Technology,Networking,Electronic and Automation Control Conference (ITNEC).Chengdu,China,2019:2495-2499. [21]LIU J,XIE Y H.Implementation of an Improved YOLO Algorithm for Intelligent Video Surveillance System[J].Information Technology and Network Security,2019,38(4):102-106. [22]WU J X,CAI N,CHEN W J,et al.Automatic Detection ofHardhats Worn by Construction Personnel:A Deep Learning Approach and Benchmark Dataset[J].Automation in Construction,2019,106:102894. [23]ZHANG M,LI J,DING R L,et al.Remote Sensing Image Object Detection Technology Based on Improved YOLO V2 Algorithm[J].Computer Science,2020,47(6A):176-180. [24]ZHAO Y,CHEN Q,CAO W G,et al.Deep Learning for Risk Detection and Trajectory Tracking at Construction Sites[J].IEEE Access,2019,7:30905-30912. [25]WU F,JIN G Q,GAO M Y,et al.Helmet Detection BasedonImproved YOLO V3 Deep Model[C]//2019 IEEE 16th International Conference on Networking,Sensing and Control (ICNSC),Banff,AB.Canada,2019:363-368. [26]HUANG G,LIU Z,VAN D M L,et al.Densely Connected Convolutional Networks[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition,Honolulu,HI.2017:4700-4708. [27]XU S K,NI C H,JI C C,et al.Image Caption of Safety Helmets Wearing in Construction Scene Based on YOLO v3[J].Compu-ter Science,2020,47(8):233-240. [28]GU Y W,XU S K,WANG Y R,et al.An Advanced DeepLearning Approach for Safety Helmet Wearing Detection[C]//2019 International Conference on Internet of Things and IEEE Green Computing and Communications and IEEE Cyber.Physical and Social Computing (CPSCom) and IEEE Smart Data.Atlanta,GA,USA,2019:669-674. [29]FANG Q,LI H,LUO X C,et al.Detecting Non-hardhat-use by a Deep Learning Method from Far-field Surveillance Videos[J].Automation in Construction,2018,85(JAN.):1-9. [30]ZHENG Z,WANG P,LIU W,et al.Distance-IOU Loss:Faster and Better Learning for Bounding Box Regression[C]//AAAI Conference on Artificial Intelligence.NY,USA,2020. [31]LIU S,QI L,QIN H F,et al.Path Aggregation Network for Instance Segmentation[C]//2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.Salt Lake City,UT,2018:8759-8768. [32]WANG C Y,LIAO H Y,YEH I H,et al.CSPNet:A New Back-bone that can Enhance Learning Capability of CNN[C]//2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).Seattle,WA,USA,2020:1571-1580. [33]CHOI J,CHUN D,KIM H,et al.Gaussian YOLO v3:An Accurate and Fast Object Detector Using Localization Uncertainty for Autonomous Driving[C]//2019 IEEE/CVF International Conference on Computer Vision (ICCV).Seoul,Korea (South),2019:502-511. |
[1] | XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171. |
[2] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[3] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[4] | WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293. |
[5] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[6] | JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335. |
[7] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[8] | HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78. |
[9] | CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126. |
[10] | HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163. |
[11] | ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169. |
[12] | SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235. |
[13] | WANG Jun-feng, LIU Fan, YANG Sai, LYU Tan-yue, CHEN Zhi-yu, XU Feng. Dam Crack Detection Based on Multi-source Transfer Learning [J]. Computer Science, 2022, 49(6A): 319-324. |
[14] | CHU Yu-chun, GONG Hang, Wang Xue-fang, LIU Pei-shun. Study on Knowledge Distillation of Target Detection Algorithm Based on YOLOv4 [J]. Computer Science, 2022, 49(6A): 337-344. |
[15] | ZHOU Zhi-hao, CHEN Lei, WU Xiang, QIU Dong-liang, LIANG Guang-sheng, ZENG Fan-qiao. SMOTE-SDSAE-SVM Based Vehicle CAN Bus Intrusion Detection Algorithm [J]. Computer Science, 2022, 49(6A): 562-570. |
|