Abstract
X-ray imagery systems have enabled security personnel to identify potential threats contained within the baggage and cargo since the early 1970s. However, the manual process of screening the threatening items is time-consuming and vulnerable to human error. Hence, researchers have utilized recent advancements in computer vision techniques, revolutionized by machine learning models, to aid in baggage security threat identification via 2D X-ray and 3D CT imagery. However, the performance of these approaches is severely affected by heavy occlusion, class imbalance, and limited labeled data, further complicated by ingeniously concealed emerging threats. Hence, the research community must devise suitable approaches by leveraging the findings from existing literature to move in new directions. Towards that goal, we present a structured survey providing systematic insight into state-of-the-art advances in baggage threat detection. Furthermore, we also present a comprehensible understanding of X-ray-based imaging systems and the challenges faced within the threat identification domain. We include a taxonomy to classify the approaches proposed within the context of 2D and 3D CT X-ray-based baggage security threat screening and provide a comparative analysis of the performance of the methods evaluated on four benchmarks. Besides, we also discuss current open challenges and potential future research avenues.
- [1] . 2006. Screener evaluation of pseudo-colored single energy x-ray luggage images. Institute of Electrical and Electronics Engineers (IEEE), 35–35.
DOI: Google ScholarDigital Library
- [2] . 2006. Improving weapon detection in single energy x-ray images through pseudocoloring. IEEE Trans. Syst. Man Cyber. Part C: Applic. Rev. 36, 6 (
Nov. 2006), 784–796.DOI: Google ScholarDigital Library
- [3] . 2012. SLIC superpixels compared to state-of-the-art superpixel methods. IEEE Trans. Pattern Anal. Mach. Intell. 34, 11 (2012), 2274–2281.
DOI: Google ScholarDigital Library
- [4] . 2008. CenSurE: Center surround extremas for realtime feature detection and matching. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 5305 LNCS.
DOI: Google ScholarCross Ref
- [5] . 2022. Balanced affinity loss for highly imbalanced baggage threat contour-driven instance segmentation. In IEEE International Conference on Image Processing (ICIP).Google Scholar
Cross Ref
- [6] Samet Akcay, Amir Atapour-Abarghouei, and Toby P. Breckon. 2018. Ganomaly: Semi-supervised anomaly detection via adversarial training. In Asian Conference on Computer Vision. Springer, 622–637.Google Scholar
- [7] . 2019. Skip-GANomaly: Skip connected and adversarially trained encoder-decoder anomaly detection. In International Joint Conference on Neural Networks (IJCNN). IEEE, 1–8.Google Scholar
Cross Ref
- [8] . 2022. Towards automatic threat detection: A survey of advances of deep learning within x-ray security imaging. Patt. Recog. 122 (2022), 108245.Google Scholar
Digital Library
- [9] . 2017. An evaluation of region based object detection strategies within x-ray baggage security imagery. In IEEE International Conference on Image Processing (ICIP). IEEE, 1337–1341.Google Scholar
Digital Library
- [10] . 2016. Transfer learning using convolutional neural networks for object classification within X-ray baggage security imagery. In International Conference on Image Processing. IEEE Computer Society, 1057–1061.
DOI: Google ScholarCross Ref
- [11] . 2018. Using deep convolutional neural network architectures for object classification and detection within x-ray baggage security imagery. IEEE Trans. Inf. Forens. Secur. 13, 9 (
Sep. 2018), 2203–2215.DOI: Google ScholarCross Ref
- [12] . 2008. Full orientation invariance and improved feature selectivity of 3D SIFT with application to medical image analysis. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. IEEE, 1–8.Google Scholar
Cross Ref
- [13] . 2019. Semantic segmentation for prohibited items in baggage inspection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11935 LNCS. Springer, 495–505.
DOI: Google ScholarCross Ref
- [14] . 2016. Detecting anomalous data using auto-encoders. Int. J. Mach. Learn. Comput. 6, 1 (2016).Google Scholar
- [15] . 1996. Multiscale nonlinear decomposition: The sieve decomposition theorem. IEEE Trans. Pattern Anal. Mach. Intell. 18, 5 (1996).
DOI: Google ScholarDigital Library
- [16] . 2013. Object recognition in multi-view dual energy x-ray images. In British Machine Vision Conference, Vol. 1. 11.Google Scholar
Cross Ref
- [17] . 2021. Volatile liquid detection by terahertz technologies. Front. Phys. 9 (2021), 107.Google Scholar
Cross Ref
- [18] . 2017. Analysis of feature detector and descriptor combinations with a localization experiment for various performance metrics. Turk. J. Electric. Eng. Comput. Sci. 25, 3 (2017).
DOI: Google ScholarCross Ref
- [19] . 2015. Multi-view object detection in dual-energy X-ray images. Mach. Vis. Applic. 26, 7-8 (
Nov. 2015), 1045–1060.DOI: Google ScholarDigital Library
- [20] . 2011. Visual words on baggage x-ray images. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 360–368.
DOI: Google ScholarCross Ref
- [21] . 2002. Shape matching and object recognition using shape contexts. IEEE Trans. Pattern Anal. Mach. Intell. 24, 4 (2002).
DOI: Google ScholarDigital Library
- [22] . 2019. On the impact of object and sub-component level segmentation strategies for supervised anomaly detection within X-ray security imagery. In 18th IEEE International Conference on Machine Learning and Applications. Institute of Electrical and Electronics Engineers Inc., 986–991.
DOI: arxiv:1911.08216. Google ScholarCross Ref
- [23] . 2019. Using deep neural networks to address the evolving challenges of concealed threat detection within complex electronic items. In IEEE International Symposium on Technologies for Homeland Security.
DOI: Google ScholarCross Ref
- [24] . 2021. On the impact of using X-ray energy response imagery for object detection via convolutional neural networks. In IEEE International Conference on Image Processing (ICIP). IEEE, 1224–1228.Google Scholar
Cross Ref
- [25] N. Bhowmik, Q. Wang, Y. F. A. Gaus, M. Szarek, and T. P. Breckon. 2019. The good the bad and the ugly: Evaluating convolutional neural networks for prohibited item detection using real and synthetically composited X-ray imagery. British Machine Vision Conference Workshops.Google Scholar
- [26] . 2001. Random forests. Mach. Learn. 45, 1 (2001).
DOI: Google ScholarDigital Library
- [27] . 2016. Generative and discriminative voxel modeling with convolutional neural networks. arXiv preprint arXiv:1608.04236 (2016).Google Scholar
- [28] . 2020. Limits on transfer learning from photographic image data to x-ray threat detection. J. X-Ray Sci. Technol. 27, 6 (2020).
DOI: Google ScholarCross Ref
- [29] . 2010. Enhanced color coding scheme for kinetic depth effect X-ray (KDEX) imaging. In International Carnahan Conference on Security Technology. 155–160.
DOI: Google ScholarCross Ref
- [30] . 2009. Feasibility of SIFT to synthesise KDEX imagery for aviation luggage security screening. In IET Seminar Digest, Vol. 2009.
DOI: Google ScholarCross Ref
- [31] . 2013. KNN matting. IEEE Trans. Pattern Anal. Mach. Intell. 35, 9 (2013).
DOI: Google ScholarDigital Library
- [32] . 2015. Geometrical approach for automatic detection of liquid surfaces in 3D computed tomography baggage imagery. Imag. Sci. J. 63, 8 (2015).
DOI: Google ScholarCross Ref
- [33] . 2020. CH-Net: Deep adversarial autoencoders for semantic segmentation in x-ray images of cabin baggage screening at airports. J. Transport. Secur. 13, 1-2 (
June 2020), 71–89.DOI: Google ScholarCross Ref
- [34] . 2016. 3D U-Net: Learning dense volumetric segmentation from sparse annotation. In International Conference on Medical Image Computing and Computer-assisted Intervention. Springer, 424–432.Google Scholar
- [35] . 1995. Support-vector networks. Mach. Learn. 20, 3 (1995).
DOI: Google ScholarDigital Library
- [36] . 2018. Adaptive Automated Threat Recognition. (2018). Retrieved from http://docplayer.net/189877852-Adaptive-automated-threat-recognition-aatr-introduction.html.Google Scholar
- [37] . 2013. ALERT Strategic Studies.
Technical Report . Northeastern University, Boston. Retrieved from https://myfiles.neu.edu/groups/ALERT/strategic_studies/SegmentationInitiativeFinalReport.pdf.Google Scholar - [38] . 2016. R-FCN: Object detection via region-based fully convolutional networks. In Conference on Advances in Neural Information Processing Systems.Google Scholar
- [39] . 2005. Histograms of oriented gradients for human detection. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
DOI: Google ScholarDigital Library
- [40] . 2012. Automated diagnosis of Alzheimer disease using the scale-invariant feature transforms in magnetic resonance images. J. Medic. Syst. 36, 2 (2012), 995–1000.Google Scholar
Digital Library
- [41] . 2021. An improved hybrid approach for handling class imbalance problem. Arab. J. Sci. Eng. 46, 4 (2021), 3853–3864.Google Scholar
Cross Ref
- [42] . 2019. An evaluation of deep learning based object detection strategies for threat object detection in baggage security imagery. Pattern Recog. Lett. 120 (
Apr. 2019), 112–119.DOI: Google ScholarDigital Library
- [43] . 1945. Measures of the amount of ecologic association between species. Ecology 26, 3 (1945).
DOI: Google ScholarCross Ref
- [44] . 2006. X-ray image segmentation by attribute relational graph matching. In International Conference on Signal Processing Proceedings. Institute of Electrical and Electronics Engineers Inc.
DOI: Google ScholarCross Ref
- [45] . 2017. Adversarial feature learning. In 5th International Conference on Learning Representations.Google Scholar
- [46] . 1995. COSMOS—A representation scheme for free-form surfaces. In IEEE International Conference on Computer Vision.
DOI: Google ScholarCross Ref
- [47] . 2020. Evaluating GAN-based image augmentation for threat detection in large-scale xray security images. Appl. Sci. 11, 1 (
Dec. 2020), 36.DOI: Google ScholarCross Ref
- [48] . 2019. KNN-based automatic cropping for improved threat object recognition in x-ray security images. J. IKEEE 23, 4 (2019), 1134–1139.Google Scholar
- [49] . 2020. A new GAN-based anomaly detection (GBAD) approach for multi-threat object classification on large-scale x-ray security images. IEICE Trans. Inf. Syst. E103D, 2 (2020).
DOI: Google ScholarCross Ref
- [50] Regina K. Ferrell, Kenneth W. Tobin, and Besma A. Abidi. 2001. Operator-assisted Threat Assessment: Adaptation of a Focus-of-attention Technique to the Identification of Potential Threat Regions in Carry-on Baggage Imagery. In 3rd International Aviation Security Technology Symposium, Atlantic City, NJ. Citeseer.Google Scholar
- [51] . 1985. The radon transform and some of its applications. Optica Acta: Int. J. Opt. 32, 1 (1985).
DOI: Google ScholarCross Ref
- [52] . 2010. Object recognition using 3D SIFT in complex CT volumes. In British Machine Vision Conference.
DOI: Google ScholarCross Ref
- [53] . 2012. A 3D extension to cortex like mechanisms for 3D object class recognition. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
DOI: Google ScholarCross Ref
- [54] . 2013. A comparison of 3D interest point descriptors with application to airport baggage object detection in complex CT imagery. Patt. Recog. 46, 9 (
Sep. 2013), 2420–2436.DOI: Google ScholarDigital Library
- [55] . 2015. Object classification in 3D baggage security computed tomography imagery using visual codebooks. Patt. Recog. 48, 8 (
Aug. 2015), 2489–2499.DOI: Google ScholarDigital Library
- [56] . 2012. Object detection in multi-view x-ray images. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 7476 LNCS. Springer, Berlin, 144–154.
DOI: Google ScholarCross Ref
- [57] . 2019. YOLO-based threat object detection in x-ray images. In IEEE 11th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment, and Management.
DOI: Google ScholarCross Ref
- [58] . 2021. Res2Net: A new multi-scale backbone architecture. IEEE Trans. Pattern Anal. Mach. Intell. 43, 2 (2021).
DOI: Google ScholarDigital Library
- [59] . 2019. Evaluating the transferability and adversarial discrimination of convolutional neural networks for threat object detection and classification within x-ray security imagery. In 18th IEEE International Conference on Machine Learning and Applications. Institute of Electrical and Electronics Engineers Inc., 420–425.
DOI: Google ScholarCross Ref
- [60] . 2019. Evaluation of a dual convolutional neural network architecture for object-wise anomaly detection in cluttered x-ray security imagery. In International Joint Conference on Neural Networks. Institute of Electrical and Electronics Engineers Inc.
DOI: Google ScholarCross Ref
- [61] . 2009. Automatic image analysis process for the detection of concealed weapons. In ACM International Conference Proceeding Series. ACM Press, New York, NY, 1.
DOI: Google ScholarDigital Library
- [62] . 2018. Passenger baggage object database (PBOD). In AIP Conference Proceedings, Vol. 1949. American Institute of Physics Inc., 230021.
DOI: Google ScholarCross Ref
- [63] . 2015. Visual detection of knives in security applications using active appearance models. Multim. Tools Applic. 74, 12 (2015).
DOI: Google ScholarDigital Library
- [64] . 2014. Generative adversarial nets. In Conference on Advances in Neural Information Processing Systems.
DOI: Google ScholarCross Ref
- [65] . 2006. Fast, quality, segmentation of large volumes—isoperimetric distance trees. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 3953 LNCS.
DOI: Google ScholarDigital Library
- [66] . 2012. Automatic segmentation of unknown objects, with application to baggage security. In European Conference on Computer Vision. Springer, 430–444.Google Scholar
Cross Ref
- [67] . 2019. “Unexpected item in the bagging area”: Anomaly detection in x-ray security images. IEEE Trans. Inf. Forens. Secur. 14, 6 (
June 2019), 1539–1553.DOI: Google ScholarCross Ref
- [68] . 2003. KNN model-based approach in classification. In OTM Confederated International Conferences. Springer, 986–996.Google Scholar
Cross Ref
- [69] . 2021. Class distribution-aware adaptive margins and cluster embedding for classification of fruit and vegetables at supermarket self-checkouts. Neurocomputing 461 (2021), 292–309.Google Scholar
Digital Library
- [70] . 1988. A combined edge and corner detector. In Alvey Vision Conference.Google Scholar
Cross Ref
- [71] Taimur Hassan and Naoufel Werghi. 2020. Trainable Structure Tensors for Autonomous Baggage Threat Detection Under Extreme Occlusion. In Proceedings of the Asian Conference on Computer Vision (ACCV).Google Scholar
- [72] Taimur Hassan, Samet Akcay, Mohammed Bennamoun, Salman Khan, and Naoufel Werghi. 2021. A Novel Incremental Learning Driven Instance Segmentation Framework to Recognize Highly Cluttered Instances of the Contraband Items. IEEE Transactions on Systems, Man, and Cybernetics: Systems (2021). Google Scholar
Cross Ref
- [73] . 2021. Tensor pooling-driven instance segmentation framework for baggage threat recognition. Neural Comput. Applic. (2021), 1–12.Google Scholar
- [74] Taimur Hassan, Samet Akçay, Mohammed Bennamoun, Salman Khan, and Naoufel Werghi. 2021. Unsupervised anomaly instance segmentation for baggage threat recognition. Journal of Ambient Intelligence and Humanized Computing (2021), 1–12. Google Scholar
Cross Ref
- [75] . 2020. Detecting prohibited items in x-ray images: A contour proposal learning approach. In International Conference on Image Processing. IEEE Computer Society, 2016–2020.
DOI: Google ScholarCross Ref
- [76] . 2019. Cascaded structure tensor framework for robust identification of heavily occluded baggage items from multi-vendor x-ray scans. arXiv preprint arXiv:1912.04251 (
Dec. 2019).Google Scholar - [77] . 2020. Meta-transfer learning driven tensor-shot detector for the autonomous localization and recognition of concealed baggage threats. Sensors (Switzer.) 20, 22 (2020).
DOI: Google ScholarCross Ref
- [78] . 2019. Detecting bombs in x-ray images of hold baggage: 2D versus 3D imaging. Hum. Fact. 61, 2 (
Mar. 2019), 305–321.DOI: Google ScholarCross Ref
- [79] . 2020. Mask R-CNN. IEEE Trans. Pattern Anal. Mach. Intell. 42, 2 (2020).
DOI: Google ScholarCross Ref
- [80] . 2016. Deep residual learning for image recognition. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
DOI: Google ScholarCross Ref
- [81] . 2008. A new enhancement technique of x-ray carry-on luggage images based on DWT and fuzzy theory. In International Conference on Computer Science and Information Technology. 855–858.
DOI: Google ScholarDigital Library
- [82] . 2010. Object separation in x-ray image sets. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 2093–2100.
DOI: Google ScholarCross Ref
- [83] . 2005. Using threat image projection data for assessing individual screener performance. In WIT Transactions on the Built Environment, Vol. 82.
DOI: Google ScholarCross Ref
- [84] . 2020. Multi-label X-ray imagery classification via bottom-up attention and meta fusion. In Asian Conference on Computer Vision.Google Scholar
- [85] . 2017. Densely connected convolutional networks. In 30th IEEE Conference on Computer Vision and Pattern Recognition.
DOI: Google ScholarCross Ref
- [86] . 2016. Automated detection of smuggled high-risk security threats using deep learning. In IET Seminar Digest, Vol. 2016.
DOI: Google ScholarCross Ref
- [87] . 2017. 3D scanners can “digitally unpack” carry-ons and transform airport checkpoints with better, faster security. (
Nov. 2017). Retrieved from https://www.usatoday.com/story/news/2017/11/16/tsa-tests-3-d-scanners-transform-airport-checkpoints-witto-potentially-boost-security-and-speed-line/869982001/.Google Scholar - [88] . 2015. Joint metal artifact reduction and segmentation of CT images using dictionary-based image prior and continuous-relaxed potts model. In International Conference on Image Processing. IEEE Computer Society, 798–802.
DOI: Google ScholarDigital Library
- [89] Tero Karras, Timo Aila, Samuli Laine, and Jaakko Lehtinen. 2018. Progressive Growing of GANs for Improved Quality, Stability, and Variation. In International Conference on Learning Representations. https://openreview.net/forum?id=Hk99zCeAb.Google Scholar
- [90] . 2006. Millimetre wave and terahertz technology for the detection of concealed threats: A review. In Optics and Photonics for Counterterrorism and Crime Fighting II, Vol. 6402. SPIE, 64020D.
DOI: Google ScholarCross Ref
- [91] . 2022. Continual learning objective for analyzing complex knowledge representations. Sensors 22, 4 (2022), 1667.Google Scholar
Cross Ref
- [92] . 2020. A review of airport dual energy x-ray baggage inspection techniques: Image enhancement and noise reduction. J. X-ray Sci. Technol. 28, 3 (2020), 481–505.Google Scholar
- [93] . 1990. Invariant image recognition by Zernike moments. IEEE Trans. Pattern Anal. Mach. Intell. 12, 5 (1990).
DOI: Google ScholarDigital Library
- [94] . 2020. Generative adversarial networks and faster-region convolutional neural networks based object detection in x-ray baggage security imagery. OSA Continuum 3, 12 (
Dec. 2020), 3604.DOI: Google ScholarCross Ref
- [95] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. ImageNet classification with deep convolutional neural networks. Commun. ACM 60 (2012), 84–90. Google Scholar
Digital Library
- [96] . 1998. Cost-sensitive learning with neural networks. In 13th European Conference on Artificial Intelligence, Vol. 15. Citeseer, 88–94.Google Scholar
- [97] . 2016. On using feature descriptors as visual words for object detection within x-ray baggage security screening. In IET Seminar Digest, Vol. 2016. Institution of Engineering and Technology.
DOI: Google ScholarCross Ref
- [98] S. Lazebnik, C. Schmid, and J. Ponce. 2005. A sparse texture representation using local affine regions. IEEE Transactions on Pattern Analysis and Machine Intelligence 27, 8 (2005), 1265–1278. Google Scholar
Digital Library
- [99] . 2006. Interleaving object categorization and segmentation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 3948 LNCS. Springer Verlag, 145–161.
DOI: Google ScholarCross Ref
- [100] . 2021. A GAN based method for multiple prohibited items synthesis of x-ray security image. Optoelectron. Lett. 17, 2 (2021), 112–117.Google Scholar
Cross Ref
- [101] . 2004. Improving the detection of low-density weapons in x-ray luggage scans using image enhancement and novel scene-decluttering techniques. J. Electron. Imag. 13, 3 (
July 2004), 523.DOI: Google ScholarCross Ref
- [102] . 2018. Automatic threat recognition of prohibited items at aviation checkpoint with x-ray imaging: A deep learning approach. In Anomaly Detection and Imaging with X-Rays (ADIX) III, , , , and (Eds.), Vol. 10632. SPIE, 2.
DOI: Google ScholarCross Ref
- [103] . 2018. Automatic threat recognition of prohibited items at aviation checkpoint with x-ray imaging: A deep learning approach. In Anomaly Detection and Imaging with X-Rays (ADIX) III, Vol. 10632. International Society for Optics and Photonics, 1063203.Google Scholar
- [104] K. J. Liang et al. 2019. Toward automatic threat recognition for airport X-ray baggage screening with deep convolutional object detection. arXiv:1912.06329. http://arxiv.org/abs/1912.06329.Google Scholar
- [105] . 2003. The global k-means clustering algorithm. Pattern Recog. 36, 2 (
Feb. 2003), 451–461.DOI: Google ScholarCross Ref
- [106] . 2020. Focal loss for dense object detection. IEEE Trans. Pattern Anal. Mach. Intell. 42, 2 (2020).
DOI: Google ScholarCross Ref
- [107] . 2008. A united classification system of X-ray image based on fuzzy rule and neural networks. In 3rd International Conference on Intelligent System and Knowledge Engineering. 717–722.
DOI: Google ScholarCross Ref
- [108] . 2019. Deep convolutional neural network based object detector for X-ray baggage security imagery. In International Conference on Tools with Artificial Intelligence. IEEE Computer Society, 1757–1761.
DOI: Google ScholarCross Ref
- [109] . 2016. SSD: Single shot multibox detector. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 9905 LNCS. Springer Verlag, 21–37.
DOI: arxiv:1512.02325. Google ScholarCross Ref
- [110] . 2019. Detection and recognition of security detection object based on YOLO9000. In 5th International Conference on Systems and Informatics. Institute of Electrical and Electronics Engineers Inc., 278–282.
DOI: Google ScholarCross Ref
- [111] . 2015. Fully convolutional networks for semantic segmentation. In IEEE Conference on Computer Vision and Pattern Recognition. 3431–3440.Google Scholar
Cross Ref
- [112] . 1999. Object recognition from local scale-invariant features. In IEEE International Conference on Computer Vision, Vol. 2.
DOI: Google ScholarCross Ref
- [113] . 2016. Identification of mammography anomalies for breast cancer detection by an ensemble of classification models based on artificial immune system. Knowl.-based Syst. 101 (
June 2016), 60–70.DOI: Google ScholarDigital Library
- [114] . 2015. Adversarial autoencoders. arXiv preprint arXiv:1511.05644 (
Nov. 2015).Google Scholar - [115] . 2021. DEBISim: A simulation pipeline for dual energy CT-based baggage inspection systems. J. X-Ray Sci. Technol. 29, 2 (2021).
DOI: Google ScholarCross Ref
- [116] Ankit Manerikar, Tanmay Prakash, and Avinash C. Kak. 2020. Adaptive target recognition: a case study involving airport baggage screening. In Defense + Commercial Sensing. Google Scholar
Cross Ref
- [117] . 2012. Detection of concealed weapons in x-ray images using fuzzy K-NN. Int. J. Comput. Sci. Eng. Inf. Technol. 2, 2 (2012).
DOI: Google ScholarCross Ref
- [118] . 2015. Particle swarm optimization (PSO). A tutorial. Chemomet. Intell. Lab. Syst. 149 (2015).
DOI: Google ScholarCross Ref
- [119] . 2015. Learning-based object identification and segmentation using dual-energy CT images for security. IEEE Trans. Image Process. 24, 11 (
Nov. 2015), 4069–4081.DOI: Google ScholarDigital Library
- [120] . 2013. Investigating existing medical CT segmentation techniques within automated baggage and package inspection. In Optics and Photonics for Counterterrorism, Crime Fighting and Defence IX; and Optical Materials and Biomaterials in Security and Defence Systems Technology X, , , , , and (Eds.), Vol. 8901. SPIE, 89010L.
DOI: Google ScholarCross Ref
- [121] . 2012. Fully automatic 3D threat image projection: Application to densely cluttered 3D computed tomography baggage images. In 3rd International Conference on Image Processing Theory, Tools and Applications. 153–159.
DOI: Google ScholarCross Ref
- [122] . 2013. Radon transform based automatic metal artefacts generation for 3D threat image projection. In Optics and Photonics for Counterterrorism, Crime Fighting and Defence IX; and Optical Materials and Biomaterials in Security and Defence Systems Technology X, Vol. 8901.
DOI: Google ScholarCross Ref
- [123] . 2010. A classifier based approach for the detection of potential threats in CT based baggage screening. In International Conference on Image Processing. 1833–1836.
DOI: Google ScholarCross Ref
- [124] . 2012. A comparison of classification approaches for threat detection in CT based baggage screening. In International Conference on Image Processing. 3109–3112.
DOI: Google ScholarCross Ref
- [125] . 1992. Gabor filter-based edge detection. Pattern Recog. 25, 12 (1992).
DOI: Google ScholarCross Ref
- [126] . 2011. Automated detection in complex objects using a tracking algorithm in multiple X-ray views. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. IEEE Computer Society, 41–48.
DOI: Google ScholarCross Ref
- [127] Domingo Mery. 2014. Computer vision technology for X-ray testing. Insight-Non-Destructive Testing and Condition Monitoring 56, 3 (2014), 147–155. Google Scholar
Cross Ref
- [128] . 2015. Inspection of complex objects using multiple-x-ray views. IEEE/ASME Trans. Mechatron. 20, 1 (2015), 338–347.
DOI: Google ScholarCross Ref
- [129] . 2017. A logarithmic x-ray imaging model for baggage inspection: Simulation and object detection. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. IEEE Computer Society, 251–259.
DOI: Google ScholarCross Ref
- [130] . 2013. Detection of regular objects in baggage using multiple X-ray views. Insight: Non-destruct. Test. Cond. Monitor. 55, 1 (2013).
DOI: Google ScholarCross Ref
- [131] . 2015. GDXray: The database of x-ray images for nondestructive testing. J. Nondestruct. Eval. 34, 4 (
Nov. 2015), 1–12.DOI: Google ScholarCross Ref
- [132] . 2013. Automated x-ray object recognition using an efficient search algorithm in multiple views. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. 368–374.
DOI: Google ScholarDigital Library
- [133] . 2017. Object recognition in x-ray testing using an efficient search algorithm in multiple views. Insight: Non-destruct. Test. Cond. Monitor. 59, 2 (2017), 85–92.Google Scholar
Cross Ref
- [134] . 2020. X-ray baggage inspection with computer vision: A survey. IEEE Access (2020).
DOI: Google ScholarCross Ref
- [135] . 2016. Object recognition in baggage inspection using adaptive sparse representations of x-ray images. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 9431. Springer Verlag, 709–720.
DOI: Google ScholarDigital Library
- [136] . 2017. Modern computer vision techniques for x-ray testing in baggage inspection. IEEE Trans. Syst. Man Cyber.: Syst. 47, 4 (
Apr. 2017), 682–692.DOI: Google ScholarCross Ref
- [137] . 2016. When and why threats go undetected: Impacts of event rate and shift length on threat detection accuracy during airport baggage screening. Hum. Fact. 58, 2 (2016), 218–228.Google Scholar
Cross Ref
- [138] . 2019. SIXray: A large-scale security inspection x-ray benchmark for prohibited item discovery in overlapping images. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
DOI: Google ScholarCross Ref
- [139] . 2007. Computer-based training increases efficiency in x-ray image interpretation by aviation security screeners. In International Carnahan Conference on Security Technology. 201–206.
DOI: Google ScholarCross Ref
- [140] . 2000. Morphological image analysis. Comput. Phys. Commun. 132, 1-2 (2000).
DOI: Google ScholarCross Ref
- [141] . 2007. Fast discriminative visual codebooks using randomized clustering forests. In Conference on Advances in Neural Information Processing Systems.
DOI: Google ScholarCross Ref
- [142] . 2019. Convolutional neural networks for automatic threat detection in security x-ray images. In 17th IEEE International Conference on Machine Learning and Applications. Institute of Electrical and Electronics Engineers Inc., 285–292.
DOI: Google ScholarCross Ref
- [143] . 2014. On Artefact Reduction, Segmentation and Classification of 3D Computed Tomography Imagery in Baggage Security Screening. Ph.D. Dissertation. Cranfield University, Britain.Google Scholar
- [144] Andre Mouton and Toby P. Breckon. 2015. A review of automated image understanding within 3D baggage computed tomography security screening. Journal of X-ray Science and Technology 23, 5 (2015), 531–555. Google Scholar
Cross Ref
- [145] . 2015. Materials-based 3D segmentation of unknown objects from dual-energy computed tomography imagery in baggage security screening. Pattern Recog. 48, 6 (2015), 1961–1978.Google Scholar
Digital Library
- [146] . 2014. 3D object classification in baggage computed tomography imagery using randomised clustering forests. In IEEE International Conference on Image Processing. Institute of Electrical and Electronics Engineers Inc., 5202–5206.
DOI: Google ScholarCross Ref
- [147] . 2013. An evaluation of image denoising techniques applied to CT baggage screening imagery. In IEEE International Conference on Industrial Technology. 1063–1068.
DOI: Google ScholarCross Ref
- [148] . 2013. A distance driven method for metal artefact reduction in computed tomography. In IEEE International Conference on Image Processing.
DOI: Google ScholarCross Ref
- [149] Andre Mouton, Najla Megherbi, Katrien Van Slambrouck, Johan Nuyts, and Toby P. Breckon. 2013. An experimental survey of metal artifact reduction in computed tomography. Journal of X-ray Science and Technology 21, 2 (2013), 193–226. Google Scholar
Cross Ref
- [150] . 2021. Improved x-ray baggage screening sensitivity with “targetless” search training. Cog. Res.: Princip. Implic. 6, 1 (2021), 1–20.Google Scholar
- [151] . 2008. Object class recognition and localization using sparse features with limited receptive fields. Int. J. Comput. Vis. 80, 1 (2008).
DOI: Google ScholarDigital Library
- [152] . 2007. A weighted fuzzy classifier and its application to image processing tasks. Fuzzy Sets Syst. 158, 3 (2007).
DOI: Google ScholarDigital Library
- [153] . 2008. Automatic detection of potential threat objects in x-ray luggage scan images. In IEEE International Conference on Technologies for Homeland Security. 504–509.
DOI: Google ScholarCross Ref
- [154] Alexey Guilarte Noa, Alexey Guilarte Noa, Edel B. García Reyes, and Serie Azul. 2011. Image Processing Methods for X-Ray Luggage Images: A Survey. Journal Computer Science (2011). http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.715.2810Google Scholar
- [155] . 2004. Shape retrieval using 3D Zernike descriptors. Comput.-aid. Des. 36, 11 (2004), 1047–1062.Google Scholar
Digital Library
- [156] . 2006. Sampling strategies for bag-of-features image classification. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 3954 LNCS.
DOI: Google ScholarDigital Library
- [157] . 2006. Identification of objects-of-interest in x-ray images. In Applied Imagery Pattern Recognition Workshop. Institute of Electrical and Electronics Engineers Inc., 17.
DOI: Google ScholarDigital Library
- [158] . 2018. Consensus relaxation on materials of interest for adaptive ATR in CT images of baggage. In Anomaly Detection and Imaging with X-Rays (ADIX) III, Vol. 10632. International Society for Optics and Photonics, 106320E.Google Scholar
- [159] . 2019. Deep weakly-supervised anomaly detection. arXiv preprint arXiv:1910.13601 (2019).Google Scholar
- [160] . 2019. Continual lifelong learning with neural networks: A review. Neural Netw. 113 (2019), 54–71.Google Scholar
Digital Library
- [161] D. Pekoske. 2018. Advanced integrated passenger and baggage screening technologies. DHS congressional appropriations reports, United States. Department of Homeland Security (2018). https://www.dhs.gov/sites/default/files/publications/tsa_-_advanced_integrated_passenger_and_baggage_screening_technologies.pdf.Google Scholar
- [162] . 2008. Why is real-world visual object recognition hard? PLoS Computat. Biol. 4, 1 (2008).
DOI: Google ScholarCross Ref
- [163] . 2017. PointNet++: Deep hierarchical feature learning on point sets in a metric space. arXiv preprint arXiv:1706.02413 (2017).Google Scholar
- [164] . 2016. Unsupervised representation learning with deep convolutional generative adversarial networks. In 4th International Conference on Learning Representations.Google Scholar
- [165] . 2017. YOLO9000: Better, faster, stronger. In 30th IEEE Conference on Computer Vision and Pattern Recognition.
DOI: Google ScholarCross Ref
- [166] Joseph Redmon and Ali Farhadi. 2018. YOLOv3: An incremental improvement. http://arxiv.org/abs/1804.02767.Google Scholar
- [167] . 2017. Faster R-CNN: Towards real-time object detection with region proposal networks. IEEE Trans. Pattern Anal. Mach. Intell. 39, 6 (2017).
DOI: Google ScholarDigital Library
- [168] . 1999. Hierarchical models of object recognition in cortex. Nat. Neurosci. 2, 11 (1999).
DOI: Google ScholarCross Ref
- [169] . 2017. Threat objects detection in x-ray images using an active vision approach. J. Nondestruct. Eval. 36, 3 (2017).
DOI: Google ScholarCross Ref
- [170] . 2019. Handgun detection in single-spectrum multiple x-ray views based on 3D object recognition. J. Nondestruct. Eval. 38, 3 (
Sep. 2019), 66.DOI: Google ScholarCross Ref
- [171] . 2012. Active x-ray testing of complex objects. In Insight: Non-destructive Testing and Condition Monitoring, Vol. 54.
DOI: Google ScholarCross Ref
- [172] . 2016. Automated detection of threat objects using adapted implicit shape model. IEEE Trans. Syst. Man Cyber.: Syst. 46, 4 (
Apr. 2016), 472–482.DOI: Google ScholarCross Ref
- [173] . 1979. Explosives detection by dual-energy computed tomography (CT). In Imaging Applications for Automated Industrial Inspection and Assembly. International Society for Optics and Photonics, 171–178. Retrieved from .Google Scholar
Cross Ref
- [174] . 2017. A deep learning framework for the automated inspection of complex dual-energy x-ray cargo imagery. In Anomaly Detection and Imaging with X-Rays (ADIX) II, Vol. 10187.
DOI: Google ScholarCross Ref
- [175] . 2017. Automated x-ray image analysis for cargo security: Critical review and future promise. J. X-ray Sci. Technol. 25, 1 (2017), 33–56.Google Scholar
Cross Ref
- [176] Daniel Saavedra, Sandipan Banerjee, and Domingo Mery. 2021. Detection of threat objects in baggage inspection with X-ray images using deep learning. Neural Computing and Applications 33, 13 (2021), 7803–7819. Google Scholar
Digital Library
- [177] . 2012. Visual cortex inspired features for object detection in x-ray images. In International Conference on Pattern Recognition.Google Scholar
- [178] . 2007. Adaptive computer-based training increases on the job performance of x-ray screeners. In International Carnahan Conference on Security Technology.
DOI: Google ScholarCross Ref
- [179] . 2020. Deep fusion driven semantic segmentation for the automatic recognition of concealed contraband items. In 12th International Conference on Soft Computing and Pattern Recognition. 550–559.Google Scholar
- [180] . 2021. Temporal fusion based multi-scale semantic segmentation for detecting concealed baggage threats. In IEEE International Conference on Systems, Man, and Cybernetics.Google Scholar
- [181] . 2019. A survey on image data augmentation for deep learning. J. Big Data 6, 1 (2019), 1–48.Google Scholar
Cross Ref
- [182] . 2020. Background adaptive faster R-CNN for semi-supervised convolutional object detection of threats in x-ray images. In Anomaly Detection and Imaging with X-Rays (ADIX) V, Vol. 11404. International Society for Optics and Photonics, 1140404.Google Scholar
- [183] . 2015. Very deep convolutional networks for large-scale image recognition. In 3rd International Conference on Learning Representations.Google Scholar
- [184] . 2004. Image segmentation optimisation for x-ray images of airline luggage. In IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety. 10–14.
DOI: Google ScholarCross Ref
- [185] . 2005. Image enhancement optimization for hand-luggage screening at airports. In Lecture Notes in Computer Science, Vol. 3687. Springer Verlag, 1–10.
DOI: Google ScholarDigital Library
- [186] . 2003. Explosives detection systems (EDS) for aviation security. Sig. Process. 83, 1 (2003).
DOI: Google ScholarDigital Library
- [187] . 2021. Understanding failures of deep networks via robust feature extraction. In IEEE/CVF Conference on Computer Vision and Pattern Recognition. 12853–12862.Google Scholar
Cross Ref
- [188] . 2015. Learning structured output representation using deep conditional generative models. Adv. Neural Inf. Process. Syst. 28 (2015).Google Scholar
- [189] . 2019. Multi-view x-ray r-CNN. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11269 LNCS. Springer Verlag, 153–168.
DOI: Google ScholarCross Ref
- [190] . 2015. Going deeper with convolutions. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition. IEEE Computer Society, 1–9.
DOI: Google ScholarCross Ref
- [191] . 2021. Towards real-world x-ray security inspection: A high-quality benchmark and lateral inhibition module for prohibited items detection. In IEEE/CVF International Conference on Computer Vision. 10923–10932.Google Scholar
Cross Ref
- [192] . 2021. Over-sampling de-occlusion attention network for prohibited items detection in noisy x-ray images. arXiv preprint arXiv:2103.00809 (
Mar. 2021).Google Scholar - [193] . 2020. Few-shot anomaly detection for polyp frames from colonoscopy. In International Conference on Medical Image Computing and Computer-assisted Intervention. Springer, 274–284.Google Scholar
Digital Library
- [194] . 2013. Improving feature-based object recognition for x-ray baggage security screening using primed visualwords. In IEEE International Conference on Industrial Technology. 1140–1145.
DOI: Google ScholarCross Ref
- [195] . 1996. Fuzzy connectedness and object definition: Theory, algorithms, and applications in image segmentation. Graph. Mod. Image Process. 58, 3 (1996).
DOI: Google ScholarDigital Library
- [196] . 2015. A preliminary approach to intelligent x-ray imaging for baggage inspection at airports. Sig. Process. Res. 4, 0 (2015).
DOI: Google ScholarCross Ref
- [197] . 2010. Visual word ambiguity. IEEE Trans. Pattern Anal. Mach. Intell. 32, 7 (2010).
DOI: Google ScholarDigital Library
- [198] . 2022. Baggage threat recognition using deep low-rank broad learning detector. In IEEE International Mediterranean Electrotechnical Conference (MELECON).Google Scholar
Cross Ref
- [199] . 2001. Rapid object detection using a boosted cascade of simple features. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
DOI: Google ScholarCross Ref
- [200] . 2003. Symmetric region growing. IEEE Trans. Image Process. 12, 9 (2003), 1007–1015.Google Scholar
Digital Library
- [201] . 2021. Towards real-world prohibited item detection: A large-scale x-ray benchmark. In IEEE/CVF International Conference on Computer Vision. 5412–5421.Google Scholar
Cross Ref
- [202] . 2019. Carafe: Content-aware reassembly of features. In IEEE/CVF International Conference on Computer Vision. 3007–3016.Google Scholar
Cross Ref
- [203] . 2005. Structural x-ray image segmentation for threat detection by attribute relational graph matching. In International Conference on Neural Networks and Brain Proceedings. IEEE Computer Society, 1206–1211.
DOI: Google ScholarCross Ref
- [204] . 2005. ARG-based segmentation of overlapping objects in multi-energy x-ray image of passenger accompanied baggage. In MIPPR 2005: Image Analysis Techniques, and (Eds.), Vol. 6044. SPIE, 60441O.
DOI: Google ScholarCross Ref
- [205] . 2020. Multi-class 3D object detection within volumetric 3D computed tomography baggage security screening imagery. In 19th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, 13–18.Google Scholar
Cross Ref
- [206] Qian Wang, Neelanjan Bhowmik, and Toby P. Breckon. 2020. On the Evaluation of Prohibited Item Classification and Detection in Volumetric 3D Computed Tomography Baggage Security Screening Imagery. In 2020 International Joint Conference on Neural Networks (IJCNN). 1–8. Google Scholar
Cross Ref
- [207] . 2020. Contraband materials detection within volumetric 3D computed tomography baggage security screening imagery. arXiv preprint arXiv:2012.11753 (2020).Google Scholar
- [208] . 2020. Generalized zero-shot domain adaptation via coupled conditional variational autoencoders. arXiv preprint arXiv:2008.01214 (2020).Google Scholar
- [209] . 2021. On the evaluation of semi-supervised 2D segmentation for volumetric 3D computed tomography baggage security screening. In International Joint Conference on Neural Networks (IJCNN). IEEE, 1–8.Google Scholar
Cross Ref
- [210] . 2020. An approach for adaptive automatic threat recognition within 3D computed tomography images for baggage security screening. J. X-ray Sci. Technol. 28, 1 (2020).
DOI: Google ScholarCross Ref
- [211] . 2020. A reference architecture for plausible threat image projection (TIP) within 3D x-ray computed tomography volumes. J. X-ray Sci. Technol. 28, 3 (2020).
DOI: Google ScholarCross Ref
- [212] . 2018. High-resolution image synthesis and semantic manipulation with conditional GANs. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 8798–8807.
DOI: Google ScholarCross Ref
- [213] . 2020. Occluded prohibited items detection: An x-ray security inspection benchmark and de-occlusion attention module. In 28th ACM International Conference on Multimedia. 138–146.Google Scholar
Digital Library
- [214] . 2021. A real-time threat image projection (TIP) model base on deep learning for x-ray baggage inspection. Phys. Lett., Secti. A: Gen. Atom. Solid State Phys. 400 (
June 2021), 127306.DOI: Google ScholarCross Ref
- [215] . 2021. AFTD-Net: Real-time anchor-free detection network of threat objects for X-ray baggage screening. J. Real-time Image Process. 18, 4 (2021), 1343–1356.Google Scholar
Digital Library
- [216] . 2012. A review of X-ray explosives detection techniques for checked baggage. Appl. Radiat. Isot. 70, 8 (2012), 1729–1746.Google Scholar
Cross Ref
- [217] Guowei Zhang, Zhiqiang Chen, Li Zhang, and Jianping Cheng. 2006. Exact Reconstruction for Dual Energy Computed Tomography Using an H-L Curve Method. In 2006 IEEE Nuclear Science Symposium Conference Record, Vol. 6. 3485–3488. Google Scholar
Cross Ref
- [218] . 2013. Imaging in airport security: Past, present, future, and the link to forensic and clinical radiology. J. Forens. Radiol. Imag. 1, 4 (2013), 152–160.Google Scholar
Cross Ref
- [219] . 1995. Neural-net-based explosives recognition with coherent x-ray scatter. In Law Enforcement Technologies: Identification Technologies and Traffic Safety, Vol. 2511. International Society for Optics and Photonics, 99–107.Google Scholar
- [220] . 2012. Automatic segmentation of CT scans of checked baggage. In 2nd International Meeting on Image Formation in X-ray CT. 310–313.Google Scholar
- [221] . 2018. Prohibited item detection in airport x-ray security images via attention mechanism based CNN. In Chinese Conference on Pattern Recognition and Computer Vision (PRCV). Springer, 429–439.Google Scholar
Cross Ref
- [222] . 2021. SliceNets–A scalable approach for object detection in 3D CT scans. In IEEE/CVF Winter Conference on Applications of Computer Vision. 335–344.Google Scholar
Cross Ref
- [223] . 2019. Data augmentation for x-ray prohibited item images using generative adversarial networks. IEEE Access 7 (2019), 28894–28902.
DOI: Google ScholarCross Ref
- [224] . 2008. 3D threat image projection. In Three-Dimensional Image Capture and Applications 2008, Vol. 6805. International Society for Optics and Photonics, 680508.Google Scholar
- [225] . 2011. Dual energy CT in clinical practice. Med. Phys. 38, 11 (2011).
DOI: Google ScholarCross Ref
- [226] . 2019. Understanding autoencoders with information theoretic concepts. Neural Netw. 117 (2019).
DOI: Google ScholarDigital Library
- [227] . 2021. Leveraging DHS Assets: Potential for the Transportation Security Administration to Enhance US Government Intelligence Capabilities. Ph.D. Dissertation. Naval Postgraduate School, Monterey, CA.Google Scholar
- [228] . 2012. Industrial applications of terahertz imaging. In Terahertz Spectroscopy and Imaging. Springer, 451–489.Google Scholar
- [229] . 2018. Efficient GAN-based anomaly detection. arXiv preprint arXiv:1802.06222 (
Feb. 2018).Google Scholar - [230] . 2010. Exact reconstruction for dual energy computed tomography using an H-L curve method.
DOI: Google ScholarCross Ref
- [231] . 2019. Self-attention generative adversarial networks. In International Conference on Machine Learning. PMLR, 7354–7363.Google Scholar
- [232] . 2015. A study of x-ray machine image local semantic features extraction model based on bag-of-words for airport security. Int. J. Smart Sens. Intell. Syst. 8, 1 (2015), 45–64.
DOI: Google ScholarCross Ref
- [233] . 2020. On using XMC R-CNN model for contraband detection within x-ray baggage security images. Math. Prob. Eng. 2020 (2020).
DOI: Google ScholarCross Ref
- [234] . 2019. X-ray image with prohibited items synthesis based on generative adversarial network. In Chinese Conference on Biometric Recognition. Springer, 379–387.Google Scholar
Digital Library
- [235] . 2003. X-ray Image Processing and Visualization for Remote Assistance of Airport Luggage Screeners. Master’s thesis. University of Tennessee, Knoxville.Google Scholar
- [236] . 2006. A combinational approach to the fusion, de-noising and enhancement of dual-energy x-ray luggage images. In CVPR-Workshops. CVPR-Workshops.
DOI: Google ScholarDigital Library
- [237] . 2017. Unpaired image-to-image translation using cycle-consistent adversarial networks. In IEEE International Conference on Computer Vision. 2223–2232.Google Scholar
Cross Ref
- [238] . 2020. Data augmentation of x-ray images in baggage inspection based on generative adversarial networks. IEEE Access 8 (2020), 86536–86544.
DOI: Google ScholarCross Ref
Index Terms
Recent Advances in Baggage Threat Detection: A Comprehensive and Systematic Survey
Recommendations
A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning
The prosperity of machine learning has been accompanied by increasing attacks on the training process. Among them, poisoning attacks have become an emerging threat during model training. Poisoning attacks have profound impacts on the target models, e.g., ...
A comprehensive review: Segmentation of MRI images-brain tumor
Segmentation of tumors in human brain aims to classify different abnormal tissues necrotic core, edema, active cells from normal tissues cerebrospinal fluid, gray matter, white matter of the brain. In existence, detection of abnormal tissues is easy for ...
Assessing Aircraft Security: A Comprehensive Survey and Methodology for Evaluation
The sophistication and complexity of cyber attacks and the variety of targeted platforms have grown in recent years. Adversaries are targeting a wide range of platforms, e.g., enterprise networks, mobile phones, PCs, and industrial control systems. The ...





Comments