skip to main content
survey

Recent Advances in Baggage Threat Detection: A Comprehensive and Systematic Survey

Published:23 December 2022Publication History
Skip Abstract Section

Abstract

X-ray imagery systems have enabled security personnel to identify potential threats contained within the baggage and cargo since the early 1970s. However, the manual process of screening the threatening items is time-consuming and vulnerable to human error. Hence, researchers have utilized recent advancements in computer vision techniques, revolutionized by machine learning models, to aid in baggage security threat identification via 2D X-ray and 3D CT imagery. However, the performance of these approaches is severely affected by heavy occlusion, class imbalance, and limited labeled data, further complicated by ingeniously concealed emerging threats. Hence, the research community must devise suitable approaches by leveraging the findings from existing literature to move in new directions. Towards that goal, we present a structured survey providing systematic insight into state-of-the-art advances in baggage threat detection. Furthermore, we also present a comprehensible understanding of X-ray-based imaging systems and the challenges faced within the threat identification domain. We include a taxonomy to classify the approaches proposed within the context of 2D and 3D CT X-ray-based baggage security threat screening and provide a comparative analysis of the performance of the methods evaluated on four benchmarks. Besides, we also discuss current open challenges and potential future research avenues.

REFERENCES

  1. [1] Abidi B., Zheng Y., Gribok A., and Abidi M.. 2006. Screener evaluation of pseudo-colored single energy x-ray luggage images. Institute of Electrical and Electronics Engineers (IEEE), 3535. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Abidi Besma R., Zheng Yue, Gribok Andrei V., and Abidi Mongi A.. 2006. Improving weapon detection in single energy x-ray images through pseudocoloring. IEEE Trans. Syst. Man Cyber. Part C: Applic. Rev. 36, 6 (Nov.2006), 784796. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Achanta Radhakrishna, Shaji Appu, Smith Kevin, Lucchi Aurelien, Fua Pascal, and Süsstrunk Sabine. 2012. SLIC superpixels compared to state-of-the-art superpixel methods. IEEE Trans. Pattern Anal. Mach. Intell. 34, 11 (2012), 22742281. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Agrawal Motilal, Konolige Kurt, and Blas Morten Rufus. 2008. CenSurE: Center surround extremas for realtime feature detection and matching. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 5305 LNCS. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Ahmed Abdelfatah, Velayudhan Divya, Hassan Taimur, Damiani Ernesto, and Werghi Naoufel. 2022. Balanced affinity loss for highly imbalanced baggage threat contour-driven instance segmentation. In IEEE International Conference on Image Processing (ICIP).Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Samet Akcay, Amir Atapour-Abarghouei, and Toby P. Breckon. 2018. Ganomaly: Semi-supervised anomaly detection via adversarial training. In Asian Conference on Computer Vision. Springer, 622–637.Google ScholarGoogle Scholar
  7. [7] Akçay Samet, Atapour-Abarghouei Amir, and Breckon Toby P.. 2019. Skip-GANomaly: Skip connected and adversarially trained encoder-decoder anomaly detection. In International Joint Conference on Neural Networks (IJCNN). IEEE, 18.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Akcay Samet and Breckon Toby. 2022. Towards automatic threat detection: A survey of advances of deep learning within x-ray security imaging. Patt. Recog. 122 (2022), 108245.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Akcay Samet and Breckon Toby P.. 2017. An evaluation of region based object detection strategies within x-ray baggage security imagery. In IEEE International Conference on Image Processing (ICIP). IEEE, 13371341.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Akçay Samet, Kundegorski Mikolaj E., Devereux Michael, and Breckon Toby P.. 2016. Transfer learning using convolutional neural networks for object classification within X-ray baggage security imagery. In International Conference on Image Processing. IEEE Computer Society, 10571061. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] Akcay Samet, Kundegorski Mikolaj E., Willcocks Chris G., and Breckon Toby P.. 2018. Using deep convolutional neural network architectures for object classification and detection within x-ray baggage security imagery. IEEE Trans. Inf. Forens. Secur. 13, 9 (Sep.2018), 22032215. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Allaire Stéphane, Kim John J., Breen Stephen L., Jaffray David A., and Pekar Vladimir. 2008. Full orientation invariance and improved feature selectivity of 3D SIFT with application to medical image analysis. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. IEEE, 18.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] An Jiuyuan, Zhang Haigang, Zhu Yue, and Yang Jinfeng. 2019. Semantic segmentation for prohibited items in baggage inspection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11935 LNCS. Springer, 495505. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Andrews J. T. A., Morton E. J., and Griffin L. D.. 2016. Detecting anomalous data using auto-encoders. Int. J. Mach. Learn. Comput. 6, 1 (2016).Google ScholarGoogle Scholar
  15. [15] Bangham J. Andrew, Chardaire Pierre, Pye C. Jeremy, and Ling Paul D.. 1996. Multiscale nonlinear decomposition: The sieve decomposition theorem. IEEE Trans. Pattern Anal. Mach. Intell. 18, 5 (1996). DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Bastan Muhammet, Byeon Wonmin, and Breuel Thomas M.. 2013. Object recognition in multi-view dual energy x-ray images. In British Machine Vision Conference, Vol. 1. 11.Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Baxter Harry W., Worrall Adam A., Pang Jie, Chen Riqing, and Yang Bin. 2021. Volatile liquid detection by terahertz technologies. Front. Phys. 9 (2021), 107.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Bayraktar Ertuǧrul and Boyraz Pinar. 2017. Analysis of feature detector and descriptor combinations with a localization experiment for various performance metrics. Turk. J. Electric. Eng. Comput. Sci. 25, 3 (2017). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Baştan Muhammet. 2015. Multi-view object detection in dual-energy X-ray images. Mach. Vis. Applic. 26, 7-8 (Nov.2015), 10451060. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Baştan Muhammet, Yousefi Mohammad Reza, and Breuel Thomas M.. 2011. Visual words on baggage x-ray images. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 360368. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Belongie Serge, Malik Jitendra, and Puzicha Jan. 2002. Shape matching and object recognition using shape contexts. IEEE Trans. Pattern Anal. Mach. Intell. 24, 4 (2002). DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Bhowmik Neelanjan, Gaus Yona Falinie A., Akcay Samet, Barker Jack W., and Breckon Toby P.. 2019. On the impact of object and sub-component level segmentation strategies for supervised anomaly detection within X-ray security imagery. In 18th IEEE International Conference on Machine Learning and Applications. Institute of Electrical and Electronics Engineers Inc., 986991. DOI:arxiv:1911.08216.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Bhowmik Neelanjan, Gaus Yona Falinie A., and Breckon Toby P.. 2019. Using deep neural networks to address the evolving challenges of concealed threat detection within complex electronic items. In IEEE International Symposium on Technologies for Homeland Security. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Bhowmik Neelanjan, Gaus Yona Falinie A., and Breckon Toby P.. 2021. On the impact of using X-ray energy response imagery for object detection via convolutional neural networks. In IEEE International Conference on Image Processing (ICIP). IEEE, 12241228.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] N. Bhowmik, Q. Wang, Y. F. A. Gaus, M. Szarek, and T. P. Breckon. 2019. The good the bad and the ugly: Evaluating convolutional neural networks for prohibited item detection using real and synthetically composited X-ray imagery. British Machine Vision Conference Workshops.Google ScholarGoogle Scholar
  26. [26] Breiman Leo. 2001. Random forests. Mach. Learn. 45, 1 (2001). DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Brock Andrew, Lim Theodore, Ritchie James M., and Weston Nick. 2016. Generative and discriminative voxel modeling with convolutional neural networks. arXiv preprint arXiv:1608.04236 (2016).Google ScholarGoogle Scholar
  28. [28] Caldwell Matthew and Griffin Lewis D.. 2020. Limits on transfer learning from photographic image data to x-ray threat detection. J. X-Ray Sci. Technol. 27, 6 (2020). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Chan Jer, Evans Paul, and Wang Xun. 2010. Enhanced color coding scheme for kinetic depth effect X-ray (KDEX) imaging. In International Carnahan Conference on Security Technology. 155160. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Chan J. W., Omar A., Evans J. P. O., Downes D., Wang X., and Liu Y.. 2009. Feasibility of SIFT to synthesise KDEX imagery for aviation luggage security screening. In IET Seminar Digest, Vol. 2009. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Chen Qifeng, Li Dingzeyu, and Tang Chi Keung. 2013. KNN matting. IEEE Trans. Pattern Anal. Mach. Intell. 35, 9 (2013). DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Chermak L., Breckon T. P., Flitton G. T., and Megherbi N.. 2015. Geometrical approach for automatic detection of liquid surfaces in 3D computed tomography baggage imagery. Imag. Sci. J. 63, 8 (2015). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Chouai Mohamed, Merah Mostefa, and Mimi Malika. 2020. CH-Net: Deep adversarial autoencoders for semantic segmentation in x-ray images of cabin baggage screening at airports. J. Transport. Secur. 13, 1-2 (June2020), 7189. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Çiçek Özgün, Abdulkadir Ahmed, Lienkamp Soeren S., Brox Thomas, and Ronneberger Olaf. 2016. 3D U-Net: Learning dense volumetric segmentation from sparse annotation. In International Conference on Medical Image Computing and Computer-assisted Intervention. Springer, 424432.Google ScholarGoogle Scholar
  35. [35] Cortes Corinna and Vapnik Vladimir. 1995. Support-vector networks. Mach. Learn. 20, 3 (1995). DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Crawford Carl, Martz Harry, and Castanon David. 2018. Adaptive Automated Threat Recognition. (2018). Retrieved from http://docplayer.net/189877852-Adaptive-automated-threat-recognition-aatr-introduction.html.Google ScholarGoogle Scholar
  37. [37] Crawford C. R., Martz H. E., and Piena H.. 2013. ALERT Strategic Studies. Technical Report. Northeastern University, Boston. Retrieved from https://myfiles.neu.edu/groups/ALERT/strategic_studies/SegmentationInitiativeFinalReport.pdf.Google ScholarGoogle Scholar
  38. [38] Dai Jifeng, Li Yi, He Kaiming, and Sun Jian. 2016. R-FCN: Object detection via region-based fully convolutional networks. In Conference on Advances in Neural Information Processing Systems.Google ScholarGoogle Scholar
  39. [39] Dalal Navneet and Triggs Bill. 2005. Histograms of oriented gradients for human detection. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. [40] Daliri Mohammad Reza. 2012. Automated diagnosis of Alzheimer disease using the scale-invariant feature transforms in magnetic resonance images. J. Medic. Syst. 36, 2 (2012), 9951000.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. [41] Desuky Abeer S. and Hussain Sadiq. 2021. An improved hybrid approach for handling class imbalance problem. Arab. J. Sci. Eng. 46, 4 (2021), 38533864.Google ScholarGoogle ScholarCross RefCross Ref
  42. [42] Dhiraj and Jain Deepak Kumar. 2019. An evaluation of deep learning based object detection strategies for threat object detection in baggage security imagery. Pattern Recog. Lett. 120 (Apr.2019), 112119. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. [43] Dice Lee R.. 1945. Measures of the amount of ecologic association between species. Ecology 26, 3 (1945). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  44. [44] Ding Jianli, Li Yuanxiang, Xu Xing, and Wang Lingling. 2006. X-ray image segmentation by attribute relational graph matching. In International Conference on Signal Processing Proceedings. Institute of Electrical and Electronics Engineers Inc.DOI:Google ScholarGoogle ScholarCross RefCross Ref
  45. [45] Donahue Jeff, Darrell Trevor, and Krähenbühl Philipp. 2017. Adversarial feature learning. In 5th International Conference on Learning Representations.Google ScholarGoogle Scholar
  46. [46] Dorai Chitra and Jain Anil K.. 1995. COSMOS—A representation scheme for free-form surfaces. In IEEE International Conference on Computer Vision. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  47. [47] Dumagpi Joanna Kazzandra and Jeong Yong-Jin. 2020. Evaluating GAN-based image augmentation for threat detection in large-scale xray security images. Appl. Sci. 11, 1 (Dec.2020), 36. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  48. [48] Dumagpi Joanna Kazzandra, Jung Woo-Young, and Jeong Yong-Jin. 2019. KNN-based automatic cropping for improved threat object recognition in x-ray security images. J. IKEEE 23, 4 (2019), 11341139.Google ScholarGoogle Scholar
  49. [49] Dumagpi Joanna Kazzandra, Jung Woo Young, and Jeong Yong Jin. 2020. A new GAN-based anomaly detection (GBAD) approach for multi-threat object classification on large-scale x-ray security images. IEICE Trans. Inf. Syst. E103D, 2 (2020). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  50. [50] Regina K. Ferrell, Kenneth W. Tobin, and Besma A. Abidi. 2001. Operator-assisted Threat Assessment: Adaptation of a Focus-of-attention Technique to the Identification of Potential Threat Regions in Carry-on Baggage Imagery. In 3rd International Aviation Security Technology Symposium, Atlantic City, NJ. Citeseer.Google ScholarGoogle Scholar
  51. [51] Fiddy M. A.. 1985. The radon transform and some of its applications. Optica Acta: Int. J. Opt. 32, 1 (1985). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  52. [52] Flitton Greg, Breckon Toby P., and Megherbi Najla. 2010. Object recognition using 3D SIFT in complex CT volumes. In British Machine Vision Conference. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  53. [53] Flitton Greg, Breckon Toby P., and Megherbi Najla. 2012. A 3D extension to cortex like mechanisms for 3D object class recognition. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  54. [54] Flitton Greg, Breckon Toby P., and Megherbi Najla. 2013. A comparison of 3D interest point descriptors with application to airport baggage object detection in complex CT imagery. Patt. Recog. 46, 9 (Sep.2013), 24202436. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. [55] Flitton Greg, Mouton Andre, and Breckon Toby P.. 2015. Object classification in 3D baggage security computed tomography imagery using visual codebooks. Patt. Recog. 48, 8 (Aug.2015), 24892499. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. [56] Franzel Thorsten, Schmidt Uwe, and Roth Stefan. 2012. Object detection in multi-view x-ray images. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 7476 LNCS. Springer, Berlin, 144154. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  57. [57] Galvez Reagan L., Dadios Elmer P., Bandala Argel A., and Vicerra Ryan Rhay P.. 2019. YOLO-based threat object detection in x-ray images. In IEEE 11th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment, and Management. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  58. [58] Gao Shang Hua, Cheng Ming Ming, Zhao Kai, Zhang Xin Yu, Yang Ming Hsuan, and Torr Philip. 2021. Res2Net: A new multi-scale backbone architecture. IEEE Trans. Pattern Anal. Mach. Intell. 43, 2 (2021). DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. [59] Gaus Yona Falinie A., Bhowmik Neelanjan, Akcay Samet, and Breckon Toby. 2019. Evaluating the transferability and adversarial discrimination of convolutional neural networks for threat object detection and classification within x-ray security imagery. In 18th IEEE International Conference on Machine Learning and Applications. Institute of Electrical and Electronics Engineers Inc., 420425. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  60. [60] Gaus Yona Falinie A., Bhowmik Neelanjan, Akcay Samet, Guillen-Garcia Paolo M., Barker Jack W., and Breckon Toby P.. 2019. Evaluation of a dual convolutional neural network architecture for object-wise anomaly detection in cluttered x-ray security imagery. In International Joint Conference on Neural Networks. Institute of Electrical and Electronics Engineers Inc.DOI:Google ScholarGoogle ScholarCross RefCross Ref
  61. [61] Gesick Richard, Saritac Caner, and Hung Chih Cheng. 2009. Automatic image analysis process for the detection of concealed weapons. In ACM International Conference Proceeding Series. ACM Press, New York, NY, 1. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. [62] Gittinger Jaxon M., Suknot April N., Jimenez Edward S., Spaulding Terry W., and Wenrich Steve A.. 2018. Passenger baggage object database (PBOD). In AIP Conference Proceedings, Vol. 1949. American Institute of Physics Inc., 230021. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  63. [63] Glowacz Andrzej, Kmieć Marcin, and Dziech Andrzej. 2015. Visual detection of knives in security applications using active appearance models. Multim. Tools Applic. 74, 12 (2015). DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. [64] Goodfellow Ian J., Pouget-Abadie Jean, Mirza Mehdi, Xu Bing, Warde-Farley David, Ozair Sherjil, Courville Aaron, and Bengio Yoshua. 2014. Generative adversarial nets. In Conference on Advances in Neural Information Processing Systems. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  65. [65] Grady Leo. 2006. Fast, quality, segmentation of large volumes—isoperimetric distance trees. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 3953 LNCS. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. [66] Grady Leo, Singh Vivek, Kohlberger Timo, Alvino Christopher, and Bahlmann Claus. 2012. Automatic segmentation of unknown objects, with application to baggage security. In European Conference on Computer Vision. Springer, 430444.Google ScholarGoogle ScholarCross RefCross Ref
  67. [67] Griffin Lewis D., Caldwell Matthew, Andrews Jerone T. A., and Bohler Helene. 2019. “Unexpected item in the bagging area”: Anomaly detection in x-ray security images. IEEE Trans. Inf. Forens. Secur. 14, 6 (June2019), 15391553. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  68. [68] Guo Gongde, Wang Hui, Bell David, Bi Yaxin, and Greer Kieran. 2003. KNN model-based approach in classification. In OTM Confederated International Conferences. Springer, 986996.Google ScholarGoogle ScholarCross RefCross Ref
  69. [69] Hameed Khurram, Chai Douglas, and Rassau Alexander. 2021. Class distribution-aware adaptive margins and cluster embedding for classification of fruit and vegetables at supermarket self-checkouts. Neurocomputing 461 (2021), 292309.Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. [70] Harris Chris and Stephens Mike. 1988. A combined edge and corner detector. In Alvey Vision Conference.Google ScholarGoogle ScholarCross RefCross Ref
  71. [71] Taimur Hassan and Naoufel Werghi. 2020. Trainable Structure Tensors for Autonomous Baggage Threat Detection Under Extreme Occlusion. In Proceedings of the Asian Conference on Computer Vision (ACCV).Google ScholarGoogle Scholar
  72. [72] Taimur Hassan, Samet Akcay, Mohammed Bennamoun, Salman Khan, and Naoufel Werghi. 2021. A Novel Incremental Learning Driven Instance Segmentation Framework to Recognize Highly Cluttered Instances of the Contraband Items. IEEE Transactions on Systems, Man, and Cybernetics: Systems (2021). Google ScholarGoogle ScholarCross RefCross Ref
  73. [73] Hassan Taimur, Akçay Samet, Bennamoun Mohammed, Khan Salman, and Werghi Naoufel. 2021. Tensor pooling-driven instance segmentation framework for baggage threat recognition. Neural Comput. Applic. (2021), 112.Google ScholarGoogle Scholar
  74. [74] Taimur Hassan, Samet Akçay, Mohammed Bennamoun, Salman Khan, and Naoufel Werghi. 2021. Unsupervised anomaly instance segmentation for baggage threat recognition. Journal of Ambient Intelligence and Humanized Computing (2021), 1–12. Google ScholarGoogle ScholarCross RefCross Ref
  75. [75] Hassan Taimur, Bettayeb Meriem, Akcay Samet, Khan Salman, Bennamoun Mohammed, and Werghi Naoufel. 2020. Detecting prohibited items in x-ray images: A contour proposal learning approach. In International Conference on Image Processing. IEEE Computer Society, 20162020. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  76. [76] Hassan Taimur, Khan Salman H., Akcay Samet, Bennamoun Mohammed, and Werghi Naoufel. 2019. Cascaded structure tensor framework for robust identification of heavily occluded baggage items from multi-vendor x-ray scans. arXiv preprint arXiv:1912.04251 (Dec.2019).Google ScholarGoogle Scholar
  77. [77] Hassan Taimur, Shafay Muhammad, Akçay Samet, Khan Salman, Bennamoun Mohammed, Damiani Ernesto, and Werghi Naoufel. 2020. Meta-transfer learning driven tensor-shot detector for the autonomous localization and recognition of concealed baggage threats. Sensors (Switzer.) 20, 22 (2020). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  78. [78] Hättenschwiler Nicole, Mendes Marcia, and Schwaninger Adrian. 2019. Detecting bombs in x-ray images of hold baggage: 2D versus 3D imaging. Hum. Fact. 61, 2 (Mar.2019), 305321. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  79. [79] He Kaiming, Gkioxari Georgia, Dollár Piotr, and Girshick Ross. 2020. Mask R-CNN. IEEE Trans. Pattern Anal. Mach. Intell. 42, 2 (2020). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  80. [80] He Kaiming, Zhang Xiangyu, Ren Shaoqing, and Sun Jian. 2016. Deep residual learning for image recognition. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  81. [81] He Xiu Ping, Han Ping, Lu Xiao Guang, and Wu Ren Biao. 2008. A new enhancement technique of x-ray carry-on luggage images based on DWT and fuzzy theory. In International Conference on Computer Science and Information Technology. 855858. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. [82] Heitz Geremy and Chechik Gal. 2010. Object separation in x-ray image sets. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 20932100. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  83. [83] Hofer F. and Schwaninger A.. 2005. Using threat image projection data for assessing individual screener performance. In WIT Transactions on the Built Environment, Vol. 82. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  84. [84] Hu Benyi, Zhang Chi, Wang Le, Zhang Qilin, and Liu Yuehu. 2020. Multi-label X-ray imagery classification via bottom-up attention and meta fusion. In Asian Conference on Computer Vision.Google ScholarGoogle Scholar
  85. [85] Huang Gao, Liu Zhuang, Maaten Laurens Van Der, and Weinberger Kilian Q.. 2017. Densely connected convolutional networks. In 30th IEEE Conference on Computer Vision and Pattern Recognition. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  86. [86] Jaccard N., Rogers T. W., Morton E. J., and Griffin L. D.. 2016. Automated detection of smuggled high-risk security threats using deep learning. In IET Seminar Digest, Vol. 2016. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  87. [87] Jansen Bart. 2017. 3D scanners can “digitally unpack” carry-ons and transform airport checkpoints with better, faster security. (Nov.2017). Retrieved from https://www.usatoday.com/story/news/2017/11/16/tsa-tests-3-d-scanners-transform-airport-checkpoints-witto-potentially-boost-security-and-speed-line/869982001/.Google ScholarGoogle Scholar
  88. [88] Jin Pengchong, Ye Dong Hye, and Bouman Charles A.. 2015. Joint metal artifact reduction and segmentation of CT images using dictionary-based image prior and continuous-relaxed potts model. In International Conference on Image Processing. IEEE Computer Society, 798802. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. [89] Tero Karras, Timo Aila, Samuli Laine, and Jaakko Lehtinen. 2018. Progressive Growing of GANs for Improved Quality, Stability, and Variation. In International Conference on Learning Representations. https://openreview.net/forum?id=Hk99zCeAb.Google ScholarGoogle Scholar
  90. [90] Kemp Michael C.. 2006. Millimetre wave and terahertz technology for the detection of concealed threats: A review. In Optics and Photonics for Counterterrorism and Crime Fighting II, Vol. 6402. SPIE, 64020D. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  91. [91] Khan Asad Mansoor, Hassan Taimur, Akram Muhammad Usman, Alghamdi Norah Saleh, and Werghi Naoufel. 2022. Continual learning objective for analyzing complex knowledge representations. Sensors 22, 4 (2022), 1667.Google ScholarGoogle ScholarCross RefCross Ref
  92. [92] Khan Sajid Ullah, Khan Imran Ullah, Ullah Imdad, Saif Naveed, and Ullah Irfan. 2020. A review of airport dual energy x-ray baggage inspection techniques: Image enhancement and noise reduction. J. X-ray Sci. Technol. 28, 3 (2020), 481505.Google ScholarGoogle Scholar
  93. [93] Khotanzad Alireza and Hong Yaw Hua. 1990. Invariant image recognition by Zernike moments. IEEE Trans. Pattern Anal. Mach. Intell. 12, 5 (1990). DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. [94] Kim Jongchol, Kim Jiyong, and Ri Jinmyong. 2020. Generative adversarial networks and faster-region convolutional neural networks based object detection in x-ray baggage security imagery. OSA Continuum 3, 12 (Dec.2020), 3604. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  95. [95] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. ImageNet classification with deep convolutional neural networks. Commun. ACM 60 (2012), 84–90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. [96] Kukar Matjaz, Kononenko Igor, et al. 1998. Cost-sensitive learning with neural networks. In 13th European Conference on Artificial Intelligence, Vol. 15. Citeseer, 8894.Google ScholarGoogle Scholar
  97. [97] Kundegorski Mikolaj E., Akçay Samet, Devereux Michael, Mouton Andre, and Breckon Toby P.. 2016. On using feature descriptors as visual words for object detection within x-ray baggage security screening. In IET Seminar Digest, Vol. 2016. Institution of Engineering and Technology. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  98. [98] S. Lazebnik, C. Schmid, and J. Ponce. 2005. A sparse texture representation using local affine regions. IEEE Transactions on Pattern Analysis and Machine Intelligence 27, 8 (2005), 1265–1278. Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. [99] Leibe Bastian and Schiele Bernt. 2006. Interleaving object categorization and segmentation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 3948 LNCS. Springer Verlag, 145161. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  100. [100] Li Da Shuang, Hu Xiao Bing, Zhang Hai Gang, and Yang Jin Feng. 2021. A GAN based method for multiple prohibited items synthesis of x-ray security image. Optoelectron. Lett. 17, 2 (2021), 112117.Google ScholarGoogle ScholarCross RefCross Ref
  101. [101] Liang Jimin. 2004. Improving the detection of low-density weapons in x-ray luggage scans using image enhancement and novel scene-decluttering techniques. J. Electron. Imag. 13, 3 (July2004), 523. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  102. [102] Liang Kevin, Gregory Chris, Diallo Souleymane O., Roe Kris, Heilmann Geert, Carin Lawrence, Carlson David, Spell Gregory, and Sigman John. 2018. Automatic threat recognition of prohibited items at aviation checkpoint with x-ray imaging: A deep learning approach. In Anomaly Detection and Imaging with X-Rays (ADIX) III, Ashok Amit, Neifeld Mark A., Gehm Michael E., and Greenberg Joel A. (Eds.), Vol. 10632. SPIE, 2. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  103. [103] Liang Kevin J., Heilmann Geert, Gregory Christopher, Diallo Souleymane O., Carlson David, Spell Gregory P., Sigman John B., Roe Kris, and Carin Lawrence. 2018. Automatic threat recognition of prohibited items at aviation checkpoint with x-ray imaging: A deep learning approach. In Anomaly Detection and Imaging with X-Rays (ADIX) III, Vol. 10632. International Society for Optics and Photonics, 1063203.Google ScholarGoogle Scholar
  104. [104] K. J. Liang et al. 2019. Toward automatic threat recognition for airport X-ray baggage screening with deep convolutional object detection. arXiv:1912.06329. http://arxiv.org/abs/1912.06329.Google ScholarGoogle Scholar
  105. [105] Likas Aristidis, Vlassis Nikos, and Verbeek Jakob J.. 2003. The global k-means clustering algorithm. Pattern Recog. 36, 2 (Feb.2003), 451461. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  106. [106] Lin Tsung Yi, Goyal Priya, Girshick Ross, He Kaiming, and Dollar Piotr. 2020. Focal loss for dense object detection. IEEE Trans. Pattern Anal. Mach. Intell. 42, 2 (2020). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  107. [107] Liu Dongmei and Wang Zhaoxia. 2008. A united classification system of X-ray image based on fuzzy rule and neural networks. In 3rd International Conference on Intelligent System and Knowledge Engineering. 717722. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  108. [108] Liu Jinyi, Leng Xiaxu, and Liu Ying. 2019. Deep convolutional neural network based object detector for X-ray baggage security imagery. In International Conference on Tools with Artificial Intelligence. IEEE Computer Society, 17571761. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  109. [109] Liu Wei, Anguelov Dragomir, Erhan Dumitru, Szegedy Christian, Reed Scott, Fu Cheng Yang, and Berg Alexander C.. 2016. SSD: Single shot multibox detector. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 9905 LNCS. Springer Verlag, 2137. DOI:arxiv:1512.02325.Google ScholarGoogle ScholarCross RefCross Ref
  110. [110] Liu Zhongqiu, Li Jianchao, Shu Yuan, and Zhang Dongping. 2019. Detection and recognition of security detection object based on YOLO9000. In 5th International Conference on Systems and Informatics. Institute of Electrical and Electronics Engineers Inc., 278282. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  111. [111] Long Jonathan, Shelhamer Evan, and Darrell Trevor. 2015. Fully convolutional networks for semantic segmentation. In IEEE Conference on Computer Vision and Pattern Recognition. 34313440.Google ScholarGoogle ScholarCross RefCross Ref
  112. [112] Lowe David G.. 1999. Object recognition from local scale-invariant features. In IEEE International Conference on Computer Vision, Vol. 2. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  113. [113] Magna Gabriele, Casti Paola, Jayaraman Sowmya Velappa, Salmeri Marcello, Mencattini Arianna, Martinelli Eugenio, and Natale Corrado Di. 2016. Identification of mammography anomalies for breast cancer detection by an ensemble of classification models based on artificial immune system. Knowl.-based Syst. 101 (June2016), 6070. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. [114] Makhzani Alireza, Shlens Jonathon, Jaitly Navdeep, Goodfellow Ian, and Frey Brendan. 2015. Adversarial autoencoders. arXiv preprint arXiv:1511.05644 (Nov.2015).Google ScholarGoogle Scholar
  115. [115] Manerikar Ankit, Li Fangda, and Kak Avinash C.. 2021. DEBISim: A simulation pipeline for dual energy CT-based baggage inspection systems. J. X-Ray Sci. Technol. 29, 2 (2021). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  116. [116] Ankit Manerikar, Tanmay Prakash, and Avinash C. Kak. 2020. Adaptive target recognition: a case study involving airport baggage screening. In Defense + Commercial Sensing. Google ScholarGoogle ScholarCross RefCross Ref
  117. [117] Roomi Mohamed Mansoor. 2012. Detection of concealed weapons in x-ray images using fuzzy K-NN. Int. J. Comput. Sci. Eng. Inf. Technol. 2, 2 (2012). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  118. [118] Marini Federico and Walczak Beata. 2015. Particle swarm optimization (PSO). A tutorial. Chemomet. Intell. Lab. Syst. 149 (2015). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  119. [119] Martin Limor, Tuysuzoglu Ahmet, Karl W. Clem, and Ishwar Prakash. 2015. Learning-based object identification and segmentation using dual-energy CT images for security. IEEE Trans. Image Process. 24, 11 (Nov.2015), 40694081. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  120. [120] Megherbi Najla, Breckon Toby P., and Flitton Greg T.. 2013. Investigating existing medical CT segmentation techniques within automated baggage and package inspection. In Optics and Photonics for Counterterrorism, Crime Fighting and Defence IX; and Optical Materials and Biomaterials in Security and Defence Systems Technology X, Zamboni Roberto, Kajzar Francois, Szep Attila A., Burgess Douglas, and Owen Gari (Eds.), Vol. 8901. SPIE, 89010L. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  121. [121] Megherbi Najla, Breckon Toby P., Flitton Greg T., and Mouton Andre. 2012. Fully automatic 3D threat image projection: Application to densely cluttered 3D computed tomography baggage images. In 3rd International Conference on Image Processing Theory, Tools and Applications. 153159. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  122. [122] Megherbi Najla, Breckon Toby P., Flitton Greg T., and Mouton Andre. 2013. Radon transform based automatic metal artefacts generation for 3D threat image projection. In Optics and Photonics for Counterterrorism, Crime Fighting and Defence IX; and Optical Materials and Biomaterials in Security and Defence Systems Technology X, Vol. 8901. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  123. [123] Megherbi Najla, Flitton Greg T., and Breckon Toby P.. 2010. A classifier based approach for the detection of potential threats in CT based baggage screening. In International Conference on Image Processing. 18331836. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  124. [124] Megherbi Najla, Han Jiwan, Breckon Toby P., and Flitton Greg T.. 2012. A comparison of classification approaches for threat detection in CT based baggage screening. In International Conference on Image Processing. 31093112. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  125. [125] Mehrotra R., Namuduri K. R., and Ranganathan N.. 1992. Gabor filter-based edge detection. Pattern Recog. 25, 12 (1992). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  126. [126] Mery Domingo. 2011. Automated detection in complex objects using a tracking algorithm in multiple X-ray views. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. IEEE Computer Society, 4148. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  127. [127] Domingo Mery. 2014. Computer vision technology for X-ray testing. Insight-Non-Destructive Testing and Condition Monitoring 56, 3 (2014), 147–155. Google ScholarGoogle ScholarCross RefCross Ref
  128. [128] Mery Domingo. 2015. Inspection of complex objects using multiple-x-ray views. IEEE/ASME Trans. Mechatron. 20, 1 (2015), 338347. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  129. [129] Mery Domingo and Katsaggelos Aggelos K.. 2017. A logarithmic x-ray imaging model for baggage inspection: Simulation and object detection. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. IEEE Computer Society, 251259. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  130. [130] Mery D., Mondragon G., Riffo V., and Zuccar I.. 2013. Detection of regular objects in baggage using multiple X-ray views. Insight: Non-destruct. Test. Cond. Monitor. 55, 1 (2013). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  131. [131] Mery Domingo, Riffo Vladimir, Zscherpel Uwe, Mondragón German, Lillo Iván, Zuccar Irene, Lobel Hans, and Carrasco Miguel. 2015. GDXray: The database of x-ray images for nondestructive testing. J. Nondestruct. Eval. 34, 4 (Nov.2015), 112. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  132. [132] Mery Domingo, Riffo Vladimir, Zuccar Irene, and Pieringer Christian. 2013. Automated x-ray object recognition using an efficient search algorithm in multiple views. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. 368374. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  133. [133] Mery Domingo, Riffo Vladimir, Zuccar Irene, and Pieringer Christian. 2017. Object recognition in x-ray testing using an efficient search algorithm in multiple views. Insight: Non-destruct. Test. Cond. Monitor. 59, 2 (2017), 8592.Google ScholarGoogle ScholarCross RefCross Ref
  134. [134] Mery Domingo, Saavedra Daniel, and Prasad Mukesh. 2020. X-ray baggage inspection with computer vision: A survey. IEEE Access (2020). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  135. [135] Mery Domingo, Svec Erick, and Arias Marco. 2016. Object recognition in baggage inspection using adaptive sparse representations of x-ray images. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 9431. Springer Verlag, 709720. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  136. [136] Mery Domingo, Svec Erick, Arias Marco, Riffo Vladimir, Saavedra Jose M., and Banerjee Sandipan. 2017. Modern computer vision techniques for x-ray testing in baggage inspection. IEEE Trans. Syst. Man Cyber.: Syst. 47, 4 (Apr.2017), 682692. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  137. [137] Meuter Renata F. I. and Lacherez Philippe F.. 2016. When and why threats go undetected: Impacts of event rate and shift length on threat detection accuracy during airport baggage screening. Hum. Fact. 58, 2 (2016), 218228.Google ScholarGoogle ScholarCross RefCross Ref
  138. [138] Miao Caijing, Xie Lingxi, Wan Fang, Su Chi, Liu Hongye, Jiao Jianbin, and Ye Qixiang. 2019. SIXray: A large-scale security inspection x-ray benchmark for prohibited item discovery in overlapping images. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  139. [139] Michel Stefan, Koller Saskia M., Ruiter Jaap C. De, Moerland Robert, Hogervorst Maarten, and Schwaninger Adrian. 2007. Computer-based training increases efficiency in x-ray image interpretation by aviation security screeners. In International Carnahan Conference on Security Technology. 201206. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  140. [140] Michielsen K. and Raedt H. De. 2000. Morphological image analysis. Comput. Phys. Commun. 132, 1-2 (2000). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  141. [141] Moosmann Frank, Triggs Bill, and Jurie Frederic. 2007. Fast discriminative visual codebooks using randomized clustering forests. In Conference on Advances in Neural Information Processing Systems. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  142. [142] Morris Trevor, Chien Tiffany, and Goodman Eric. 2019. Convolutional neural networks for automatic threat detection in security x-ray images. In 17th IEEE International Conference on Machine Learning and Applications. Institute of Electrical and Electronics Engineers Inc., 285292. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  143. [143] Mouton Andre. 2014. On Artefact Reduction, Segmentation and Classification of 3D Computed Tomography Imagery in Baggage Security Screening. Ph.D. Dissertation. Cranfield University, Britain.Google ScholarGoogle Scholar
  144. [144] Andre Mouton and Toby P. Breckon. 2015. A review of automated image understanding within 3D baggage computed tomography security screening. Journal of X-ray Science and Technology 23, 5 (2015), 531–555. Google ScholarGoogle ScholarCross RefCross Ref
  145. [145] Mouton Andre and Breckon Toby P.. 2015. Materials-based 3D segmentation of unknown objects from dual-energy computed tomography imagery in baggage security screening. Pattern Recog. 48, 6 (2015), 19611978.Google ScholarGoogle ScholarDigital LibraryDigital Library
  146. [146] Mouton Andre, Breckon Toby P., Flitton Greg T., and Megherbi Najla. 2014. 3D object classification in baggage computed tomography imagery using randomised clustering forests. In IEEE International Conference on Image Processing. Institute of Electrical and Electronics Engineers Inc., 52025206. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  147. [147] Mouton Andre, Flitton Greg T., Bizot Suzanne, Megherbi Najla, and Breckon Toby P.. 2013. An evaluation of image denoising techniques applied to CT baggage screening imagery. In IEEE International Conference on Industrial Technology. 10631068. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  148. [148] Mouton Andre, Megherbi Najla, Slambrouck Katrien Van, Nuyts Johan, and Breckon Toby P.. 2013. A distance driven method for metal artefact reduction in computed tomography. In IEEE International Conference on Image Processing. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  149. [149] Andre Mouton, Najla Megherbi, Katrien Van Slambrouck, Johan Nuyts, and Toby P. Breckon. 2013. An experimental survey of metal artifact reduction in computed tomography. Journal of X-ray Science and Technology 21, 2 (2013), 193–226. Google ScholarGoogle ScholarCross RefCross Ref
  150. [150] Muhl-Richardson Alex, Parker Maximilian G., Recio Sergio A., Tortosa-Molina Maria, Daffron Jennifer L., and Davis Greg J.. 2021. Improved x-ray baggage screening sensitivity with “targetless” search training. Cog. Res.: Princip. Implic. 6, 1 (2021), 120.Google ScholarGoogle Scholar
  151. [151] Mutch Jim and Lowe David G.. 2008. Object class recognition and localization using sparse features with limited receptive fields. Int. J. Comput. Vis. 80, 1 (2008). DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  152. [152] Nakashima Tomoharu, Schaefer Gerald, Yokota Yasuyuki, and Ishibuchi Hisao. 2007. A weighted fuzzy classifier and its application to image processing tasks. Fuzzy Sets Syst. 158, 3 (2007). DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  153. [153] Nercessian Shahan, Panetta Karen, and Agaian Sos. 2008. Automatic detection of potential threat objects in x-ray luggage scan images. In IEEE International Conference on Technologies for Homeland Security. 504509. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  154. [154] Alexey Guilarte Noa, Alexey Guilarte Noa, Edel B. García Reyes, and Serie Azul. 2011. Image Processing Methods for X-Ray Luggage Images: A Survey. Journal Computer Science (2011). http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.715.2810Google ScholarGoogle Scholar
  155. [155] Novotni Marcin and Klein Reinhard. 2004. Shape retrieval using 3D Zernike descriptors. Comput.-aid. Des. 36, 11 (2004), 10471062.Google ScholarGoogle ScholarDigital LibraryDigital Library
  156. [156] Nowak Eric, Jurie Frédéric, and Triggs Bill. 2006. Sampling strategies for bag-of-features image classification. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 3954 LNCS. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  157. [157] Oertel Carsten and Bock Peter. 2006. Identification of objects-of-interest in x-ray images. In Applied Imagery Pattern Recognition Workshop. Institute of Electrical and Electronics Engineers Inc., 17. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  158. [158] Paglieroni David W., Chandrasekaran Hema, Pechard Christian, and Jr Harry E. Martz. 2018. Consensus relaxation on materials of interest for adaptive ATR in CT images of baggage. In Anomaly Detection and Imaging with X-Rays (ADIX) III, Vol. 10632. International Society for Optics and Photonics, 106320E.Google ScholarGoogle Scholar
  159. [159] Pang Guansong, Shen Chunhua, Jin Huidong, and Hengel Anton van den. 2019. Deep weakly-supervised anomaly detection. arXiv preprint arXiv:1910.13601 (2019).Google ScholarGoogle Scholar
  160. [160] Parisi German I., Kemker Ronald, Part Jose L., Kanan Christopher, and Wermter Stefan. 2019. Continual lifelong learning with neural networks: A review. Neural Netw. 113 (2019), 5471.Google ScholarGoogle ScholarDigital LibraryDigital Library
  161. [161] D. Pekoske. 2018. Advanced integrated passenger and baggage screening technologies. DHS congressional appropriations reports, United States. Department of Homeland Security (2018). https://www.dhs.gov/sites/default/files/publications/tsa_-_advanced_integrated_passenger_and_baggage_screening_technologies.pdf.Google ScholarGoogle Scholar
  162. [162] Pinto Nicolas, Cox David D., and DiCarlo James J.. 2008. Why is real-world visual object recognition hard? PLoS Computat. Biol. 4, 1 (2008). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  163. [163] Qi Charles R., Yi Li, Su Hao, and Guibas Leonidas J.. 2017. PointNet++: Deep hierarchical feature learning on point sets in a metric space. arXiv preprint arXiv:1706.02413 (2017).Google ScholarGoogle Scholar
  164. [164] Radford Alec, Metz Luke, and Chintala Soumith. 2016. Unsupervised representation learning with deep convolutional generative adversarial networks. In 4th International Conference on Learning Representations.Google ScholarGoogle Scholar
  165. [165] Redmon Joseph and Farhadi Ali. 2017. YOLO9000: Better, faster, stronger. In 30th IEEE Conference on Computer Vision and Pattern Recognition. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  166. [166] Joseph Redmon and Ali Farhadi. 2018. YOLOv3: An incremental improvement. http://arxiv.org/abs/1804.02767.Google ScholarGoogle Scholar
  167. [167] Ren Shaoqing, He Kaiming, Girshick Ross, and Sun Jian. 2017. Faster R-CNN: Towards real-time object detection with region proposal networks. IEEE Trans. Pattern Anal. Mach. Intell. 39, 6 (2017). DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  168. [168] Riesenhuber Maximilian and Poggio Tomaso. 1999. Hierarchical models of object recognition in cortex. Nat. Neurosci. 2, 11 (1999). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  169. [169] Riffo Vladimir, Flores Sebastian, and Mery Domingo. 2017. Threat objects detection in x-ray images using an active vision approach. J. Nondestruct. Eval. 36, 3 (2017). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  170. [170] Riffo Vladimir, Godoy Ivan, and Mery Domingo. 2019. Handgun detection in single-spectrum multiple x-ray views based on 3D object recognition. J. Nondestruct. Eval. 38, 3 (Sep.2019), 66. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  171. [171] Riffo V. and Mery D.. 2012. Active x-ray testing of complex objects. In Insight: Non-destructive Testing and Condition Monitoring, Vol. 54. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  172. [172] Riffo Vladimir and Mery Domingo. 2016. Automated detection of threat objects using adapted implicit shape model. IEEE Trans. Syst. Man Cyber.: Syst. 46, 4 (Apr.2016), 472482. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  173. [173] Roder Fredrick L.. 1979. Explosives detection by dual-energy computed tomography (CT). In Imaging Applications for Automated Industrial Inspection and Assembly. International Society for Optics and Photonics, 171178. Retrieved from .Google ScholarGoogle ScholarCross RefCross Ref
  174. [174] Rogers Thomas W., Jaccard Nicolas, and Griffin Lewis D.. 2017. A deep learning framework for the automated inspection of complex dual-energy x-ray cargo imagery. In Anomaly Detection and Imaging with X-Rays (ADIX) II, Vol. 10187. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  175. [175] Rogers Thomas W., Jaccard Nicolas, Morton Edward J., and Griffin Lewis D.. 2017. Automated x-ray image analysis for cargo security: Critical review and future promise. J. X-ray Sci. Technol. 25, 1 (2017), 3356.Google ScholarGoogle ScholarCross RefCross Ref
  176. [176] Daniel Saavedra, Sandipan Banerjee, and Domingo Mery. 2021. Detection of threat objects in baggage inspection with X-ray images using deep learning. Neural Computing and Applications 33, 13 (2021), 7803–7819. Google ScholarGoogle ScholarDigital LibraryDigital Library
  177. [177] Schmidt-Hackenberg Ludwig, Yousefi Mohammad Reza, and Breuel Thomas M.. 2012. Visual cortex inspired features for object detection in x-ray images. In International Conference on Pattern Recognition.Google ScholarGoogle Scholar
  178. [178] Schwaninger Adran, Hofer Franziska, and Wetter Olive E.. 2007. Adaptive computer-based training increases on the job performance of x-ray screeners. In International Carnahan Conference on Security Technology. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  179. [179] Shafay Muhammad, Hassan Taimur, Velayudhan Divya, Damiani Ernesto, and Werghi Naoufel. 2020. Deep fusion driven semantic segmentation for the automatic recognition of concealed contraband items. In 12th International Conference on Soft Computing and Pattern Recognition. 550559.Google ScholarGoogle Scholar
  180. [180] Shafay Muhammad, Hassan Taimur, and Werghi Naoufel. 2021. Temporal fusion based multi-scale semantic segmentation for detecting concealed baggage threats. In IEEE International Conference on Systems, Man, and Cybernetics.Google ScholarGoogle Scholar
  181. [181] Shorten Connor and Khoshgoftaar Taghi M.. 2019. A survey on image data augmentation for deep learning. J. Big Data 6, 1 (2019), 148.Google ScholarGoogle ScholarCross RefCross Ref
  182. [182] Sigman John B., Spell Gregory P., Liang Kevin J., and Carin Lawrence. 2020. Background adaptive faster R-CNN for semi-supervised convolutional object detection of threats in x-ray images. In Anomaly Detection and Imaging with X-Rays (ADIX) V, Vol. 11404. International Society for Optics and Photonics, 1140404.Google ScholarGoogle Scholar
  183. [183] Simonyan Karen and Zisserman Andrew. 2015. Very deep convolutional networks for large-scale image recognition. In 3rd International Conference on Learning Representations.Google ScholarGoogle Scholar
  184. [184] Singh Maneesha and Singh Sameer. 2004. Image segmentation optimisation for x-ray images of airline luggage. In IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety. 1014. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  185. [185] Singh Maneesha and Singh Sameer. 2005. Image enhancement optimization for hand-luggage screening at airports. In Lecture Notes in Computer Science, Vol. 3687. Springer Verlag, 110. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  186. [186] Singh Sameer and Singh Maneesha. 2003. Explosives detection systems (EDS) for aviation security. Sig. Process. 83, 1 (2003). DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  187. [187] Singla Sahil, Nushi Besmira, Shah Shital, Kamar Ece, and Horvitz Eric. 2021. Understanding failures of deep networks via robust feature extraction. In IEEE/CVF Conference on Computer Vision and Pattern Recognition. 1285312862.Google ScholarGoogle ScholarCross RefCross Ref
  188. [188] Sohn Kihyuk, Lee Honglak, and Yan Xinchen. 2015. Learning structured output representation using deep conditional generative models. Adv. Neural Inf. Process. Syst. 28 (2015).Google ScholarGoogle Scholar
  189. [189] Steitz Jan Martin O., Saeedan Faraz, and Roth Stefan. 2019. Multi-view x-ray r-CNN. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11269 LNCS. Springer Verlag, 153168. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  190. [190] Szegedy Christian, Liu Wei, Jia Yangqing, Sermanet Pierre, Reed Scott, Anguelov Dragomir, Erhan Dumitru, Vanhoucke Vincent, and Rabinovich Andrew. 2015. Going deeper with convolutions. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition. IEEE Computer Society, 19. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  191. [191] Tao Renshuai, Wei Yanlu, Jiang Xiangjian, Li Hainan, Qin Haotong, Wang Jiakai, Ma Yuqing, Zhang Libo, and Liu Xianglong. 2021. Towards real-world x-ray security inspection: A high-quality benchmark and lateral inhibition module for prohibited items detection. In IEEE/CVF International Conference on Computer Vision. 1092310932.Google ScholarGoogle ScholarCross RefCross Ref
  192. [192] Tao Renshuai, Wei Yanlu, Li Hainan, Liu Aishan, Ding Yifu, Qin Haotong, and Liu Xianglong. 2021. Over-sampling de-occlusion attention network for prohibited items detection in noisy x-ray images. arXiv preprint arXiv:2103.00809 (Mar.2021).Google ScholarGoogle Scholar
  193. [193] Tian Yu, Maicas Gabriel, Pu Leonardo Zorron Cheng Tao, Singh Rajvinder, Verjans Johan W., and Carneiro Gustavo. 2020. Few-shot anomaly detection for polyp frames from colonoscopy. In International Conference on Medical Image Computing and Computer-assisted Intervention. Springer, 274284.Google ScholarGoogle ScholarDigital LibraryDigital Library
  194. [194] Turcsany Diana, Mouton Andre, and Breckon Toby P.. 2013. Improving feature-based object recognition for x-ray baggage security screening using primed visualwords. In IEEE International Conference on Industrial Technology. 11401145. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  195. [195] Udupa Jayaram K. and Samarasekera Supun. 1996. Fuzzy connectedness and object definition: Theory, algorithms, and applications in image segmentation. Graph. Mod. Image Process. 58, 3 (1996). DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  196. [196] Uroukov Ivan and Speller Robert. 2015. A preliminary approach to intelligent x-ray imaging for baggage inspection at airports. Sig. Process. Res. 4, 0 (2015). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  197. [197] Gemert Jan C. Van, Veenman Cor J., Smeulders Arnold W. M., and Geusebroek Jan Mark. 2010. Visual word ambiguity. IEEE Trans. Pattern Anal. Mach. Intell. 32, 7 (2010). DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  198. [198] Velayudhan Divya, Hassan Taimur, Ahmed Abdelfatah, Damiani Ernesto, and Werghi Naoufel. 2022. Baggage threat recognition using deep low-rank broad learning detector. In IEEE International Mediterranean Electrotechnical Conference (MELECON).Google ScholarGoogle ScholarCross RefCross Ref
  199. [199] Viola Paul and Jones Michael. 2001. Rapid object detection using a boosted cascade of simple features. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  200. [200] Wan S.-Y. and Higgins William E.. 2003. Symmetric region growing. IEEE Trans. Image Process. 12, 9 (2003), 10071015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  201. [201] Wang Boying, Zhang Libo, Wen Longyin, Liu Xianglong, and Wu Yanjun. 2021. Towards real-world prohibited item detection: A large-scale x-ray benchmark. In IEEE/CVF International Conference on Computer Vision. 54125421.Google ScholarGoogle ScholarCross RefCross Ref
  202. [202] Wang Jiaqi, Chen Kai, Xu Rui, Liu Ziwei, Loy Chen Change, and Lin Dahua. 2019. Carafe: Content-aware reassembly of features. In IEEE/CVF International Conference on Computer Vision. 30073016.Google ScholarGoogle ScholarCross RefCross Ref
  203. [203] Wang Lingling, Li Yuanxiang, Ding Jianli, and Li Kangshun. 2005. Structural x-ray image segmentation for threat detection by attribute relational graph matching. In International Conference on Neural Networks and Brain Proceedings. IEEE Computer Society, 12061211. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  204. [204] Wang Ling-Ling, Li Yuan-Xiang, Ding Jian-Li, and Ying Wei-Qin. 2005. ARG-based segmentation of overlapping objects in multi-energy x-ray image of passenger accompanied baggage. In MIPPR 2005: Image Analysis Techniques, Li Deren and Ma Hongchao (Eds.), Vol. 6044. SPIE, 60441O. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  205. [205] Wang Qian, Bhowmik Neelanjan, and Breckon Toby P.. 2020. Multi-class 3D object detection within volumetric 3D computed tomography baggage security screening imagery. In 19th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, 1318.Google ScholarGoogle ScholarCross RefCross Ref
  206. [206] Qian Wang, Neelanjan Bhowmik, and Toby P. Breckon. 2020. On the Evaluation of Prohibited Item Classification and Detection in Volumetric 3D Computed Tomography Baggage Security Screening Imagery. In 2020 International Joint Conference on Neural Networks (IJCNN). 1–8. Google ScholarGoogle ScholarCross RefCross Ref
  207. [207] Wang Qian and Breckon Toby P.. 2020. Contraband materials detection within volumetric 3D computed tomography baggage security screening imagery. arXiv preprint arXiv:2012.11753 (2020).Google ScholarGoogle Scholar
  208. [208] Wang Qian and Breckon Toby P.. 2020. Generalized zero-shot domain adaptation via coupled conditional variational autoencoders. arXiv preprint arXiv:2008.01214 (2020).Google ScholarGoogle Scholar
  209. [209] Wang Qian and Breckon Toby P.. 2021. On the evaluation of semi-supervised 2D segmentation for volumetric 3D computed tomography baggage security screening. In International Joint Conference on Neural Networks (IJCNN). IEEE, 18.Google ScholarGoogle ScholarCross RefCross Ref
  210. [210] Wang Qian, Ismail Khalid N., and Breckon Toby P.. 2020. An approach for adaptive automatic threat recognition within 3D computed tomography images for baggage security screening. J. X-ray Sci. Technol. 28, 1 (2020). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  211. [211] Wang Qian, Megherbi Najla, and Breckon Toby P.. 2020. A reference architecture for plausible threat image projection (TIP) within 3D x-ray computed tomography volumes. J. X-ray Sci. Technol. 28, 3 (2020). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  212. [212] Wang Ting Chun, Liu Ming Yu, Zhu Jun Yan, Tao Andrew, Kautz Jan, and Catanzaro Bryan. 2018. High-resolution image synthesis and semantic manipulation with conditional GANs. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 87988807. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  213. [213] Wei Yanlu, Tao Renshuai, Wu Zhangjie, Ma Yuqing, Zhang Libo, and Liu Xianglong. 2020. Occluded prohibited items detection: An x-ray security inspection benchmark and de-occlusion attention module. In 28th ACM International Conference on Multimedia. 138146.Google ScholarGoogle ScholarDigital LibraryDigital Library
  214. [214] Wei Yiru, Zhu Zhiliang, Yu Hai, and Zhang Wei. 2021. A real-time threat image projection (TIP) model base on deep learning for x-ray baggage inspection. Phys. Lett., Secti. A: Gen. Atom. Solid State Phys. 400 (June2021), 127306. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  215. [215] Wei Yiru, Zhu Zhiliang, Yu Hai, and Zhang Wei. 2021. AFTD-Net: Real-time anchor-free detection network of threat objects for X-ray baggage screening. J. Real-time Image Process. 18, 4 (2021), 13431356.Google ScholarGoogle ScholarDigital LibraryDigital Library
  216. [216] Wells K. and Bradley D. A.. 2012. A review of X-ray explosives detection techniques for checked baggage. Appl. Radiat. Isot. 70, 8 (2012), 17291746.Google ScholarGoogle ScholarCross RefCross Ref
  217. [217] Guowei Zhang, Zhiqiang Chen, Li Zhang, and Jianping Cheng. 2006. Exact Reconstruction for Dual Energy Computed Tomography Using an H-L Curve Method. In 2006 IEEE Nuclear Science Symposium Conference Record, Vol. 6. 3485–3488. Google ScholarGoogle ScholarCross RefCross Ref
  218. [218] Wetter Olive Emil. 2013. Imaging in airport security: Past, present, future, and the link to forensic and clinical radiology. J. Forens. Radiol. Imag. 1, 4 (2013), 152160.Google ScholarGoogle ScholarCross RefCross Ref
  219. [219] Wilder Joseph, Garcia Alvin, and Wiener Stephen M.. 1995. Neural-net-based explosives recognition with coherent x-ray scatter. In Law Enforcement Technologies: Identification Technologies and Traffic Safety, Vol. 2511. International Society for Optics and Photonics, 99107.Google ScholarGoogle Scholar
  220. [220] Wiley David F., Ghosh Deboshmita, and Woodhouse Christian. 2012. Automatic segmentation of CT scans of checked baggage. In 2nd International Meeting on Image Formation in X-ray CT. 310313.Google ScholarGoogle Scholar
  221. [221] Xu Maoshu, Zhang Haigang, and Yang Jinfeng. 2018. Prohibited item detection in airport x-ray security images via attention mechanism based CNN. In Chinese Conference on Pattern Recognition and Computer Vision (PRCV). Springer, 429439.Google ScholarGoogle ScholarCross RefCross Ref
  222. [222] Yang Anqi, Pan Feng, Saragadam Vishwanath, Dao Duy, Hui Zhuo, Chang Jen-Hao Rick, and Sankaranarayanan Aswin C.. 2021. SliceNets–A scalable approach for object detection in 3D CT scans. In IEEE/CVF Winter Conference on Applications of Computer Vision. 335344.Google ScholarGoogle ScholarCross RefCross Ref
  223. [223] Yang Jinfeng, Zhao Zihao, Zhang Haigang, and Shi Yihua. 2019. Data augmentation for x-ray prohibited item images using generative adversarial networks. IEEE Access 7 (2019), 2889428902. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  224. [224] Yildiz Yesna O., Abraham Douglas Q., Agaian Sos, and Panetta Karen. 2008. 3D threat image projection. In Three-Dimensional Image Capture and Applications 2008, Vol. 6805. International Society for Optics and Photonics, 680508.Google ScholarGoogle Scholar
  225. [225] Yoshizumi Terry. 2011. Dual energy CT in clinical practice. Med. Phys. 38, 11 (2011). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  226. [226] Yu Shujian and Príncipe José C.. 2019. Understanding autoencoders with information theoretic concepts. Neural Netw. 117 (2019). DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  227. [227] Zeigler Zachary D.. 2021. Leveraging DHS Assets: Potential for the Transportation Security Administration to Enhance US Government Intelligence Capabilities. Ph.D. Dissertation. Naval Postgraduate School, Monterey, CA.Google ScholarGoogle Scholar
  228. [228] Zeitler J. Axel and Shen Yao-Chun. 2012. Industrial applications of terahertz imaging. In Terahertz Spectroscopy and Imaging. Springer, 451489.Google ScholarGoogle Scholar
  229. [229] Zenati Houssam, Foo Chuan Sheng, Lecouat Bruno, Manek Gaurav, and Chandrasekhar Vijay Ramaseshan. 2018. Efficient GAN-based anomaly detection. arXiv preprint arXiv:1802.06222 (Feb.2018).Google ScholarGoogle Scholar
  230. [230] Zhang Guowei, Chen Zhiqiang, Zhang Li, and Cheng Jianping. 2010. Exact reconstruction for dual energy computed tomography using an H-L curve method. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  231. [231] Zhang Han, Goodfellow Ian, Metaxas Dimitris, and Odena Augustus. 2019. Self-attention generative adversarial networks. In International Conference on Machine Learning. PMLR, 73547363.Google ScholarGoogle Scholar
  232. [232] Zhang Ning and Zhu Jinfu. 2015. A study of x-ray machine image local semantic features extraction model based on bag-of-words for airport security. Int. J. Smart Sens. Intell. Syst. 8, 1 (2015), 4564. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  233. [233] Zhang Yong, Kong Weiwu, Li Dong, and Liu Xudong. 2020. On using XMC R-CNN model for contraband detection within x-ray baggage security images. Math. Prob. Eng. 2020 (2020). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  234. [234] Zhao Tengfei, Zhang Haigang, Zhang Yutao, and Yang Jinfeng. 2019. X-ray image with prohibited items synthesis based on generative adversarial network. In Chinese Conference on Biometric Recognition. Springer, 379387.Google ScholarGoogle ScholarDigital LibraryDigital Library
  235. [235] Zheng Yue. 2003. X-ray Image Processing and Visualization for Remote Assistance of Airport Luggage Screeners. Master’s thesis. University of Tennessee, Knoxville.Google ScholarGoogle Scholar
  236. [236] Chen Zhiyu, Zheng Yue, Abidi B. R., Page D. L., and Abidi M. A.. 2006. A combinational approach to the fusion, de-noising and enhancement of dual-energy x-ray luggage images. In CVPR-Workshops. CVPR-Workshops. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  237. [237] Zhu Jun-Yan, Park Taesung, Isola Phillip, and Efros Alexei A.. 2017. Unpaired image-to-image translation using cycle-consistent adversarial networks. In IEEE International Conference on Computer Vision. 22232232.Google ScholarGoogle ScholarCross RefCross Ref
  238. [238] Zhu Yue, Zhang Yutao, Zhang Haigang, Yang Jinfeng, and Zhao Zihao. 2020. Data augmentation of x-ray images in baggage inspection based on generative adversarial networks. IEEE Access 8 (2020), 8653686544. DOI:Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Recent Advances in Baggage Threat Detection: A Comprehensive and Systematic Survey

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Computing Surveys
        ACM Computing Surveys  Volume 55, Issue 8
        August 2023
        789 pages
        ISSN:0360-0300
        EISSN:1557-7341
        DOI:10.1145/3567473
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 23 December 2022
        • Online AM: 20 July 2022
        • Accepted: 4 July 2022
        • Revised: 17 April 2022
        • Received: 24 September 2021
        Published in csur Volume 55, Issue 8

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • survey
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text

      HTML Format

      View this article in HTML Format .

      View HTML Format