A Reference Architecture for Plausible Threat Image Projection (TIP) Within 3D X-ray Computed Tomography Volumes
暂无分享,去创建一个
[1] A. Rahmim,et al. Metal artifact reduction in CT-based attenuation correction of PET using sobolev sinogram restoration , 2011, 2011 IEEE Nuclear Science Symposium Conference Record.
[2] Bram van Ginneken,et al. A survey on deep learning in medical image analysis , 2017, Medical Image Anal..
[3] A. Rahmim,et al. Sparsity constrained sinogram inpainting for metal artifact reduction in x-ray computed tomography , 2011, 2011 IEEE Nuclear Science Symposium Conference Record.
[4] Azriel Rosenfeld,et al. Digital picture analysis , 1976 .
[5] Ajith Abraham,et al. Inertia Weight strategies in Particle Swarm Optimization , 2011, 2011 Third World Congress on Nature and Biologically Inspired Computing.
[6] Calvin R. Maurer,et al. A Linear Time Algorithm for Computing Exact Euclidean Distance Transforms of Binary Images in Arbitrary Dimensions , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[7] D. Neil,et al. Threat Image Projection in CCTV , 2007, 2007 41st Annual IEEE International Carnahan Conference on Security Technology.
[8] Yue Shi,et al. A modified particle swarm optimizer , 1998, 1998 IEEE International Conference on Evolutionary Computation Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98TH8360).
[9] Riccardo Poli,et al. Particle swarm optimization , 1995, Swarm Intelligence.
[10] Sarah Eichmann,et al. The Radon Transform And Some Of Its Applications , 2016 .
[11] D. M. McAnulty,et al. Operational Assessment for Screener Proficiency Evaluation and Reporting System (SPEARS) Threat Image Projection. , 1996 .
[12] Peter J. Angeline,et al. Evolutionary Optimization Versus Particle Swarm Optimization: Philosophy and Performance Differences , 1998, Evolutionary Programming.
[13] Toby P. Breckon,et al. Investigating existing medical CT segmentation techniques within automated baggage and package inspection , 2013, Optics/Photonics in Security and Defence.
[14] Toby P. Breckon,et al. Using Deep Convolutional Neural Network Architectures for Object Classification and Detection Within X-Ray Baggage Security Imagery , 2018, IEEE Transactions on Information Forensics and Security.
[15] Geoffrey I. Webb,et al. Encyclopedia of Machine Learning , 2011, Encyclopedia of Machine Learning.
[16] Toby P. Breckon,et al. An Approach for Adaptive Automatic Threat Recognition Within 3D Computed Tomography Images for Baggage Security Screening , 2019, Journal of X-ray science and technology.
[17] Lester James V. Miranda,et al. PySwarms: a research toolkit for Particle Swarm Optimization in Python , 2018, J. Open Source Softw..
[18] Toby P. Breckon,et al. Radon transform based automatic metal artefacts generation for 3D threat image projection , 2013, Optics/Photonics in Security and Defence.
[19] Nicole Hättenschwiler,et al. Detecting Bombs in X-Ray Images of Hold Baggage: 2D Versus 3D Imaging , 2018, Hum. Factors.
[20] F Hofer,et al. Using threat image projection data for assessing individual screener performance , 2005 .
[21] P. Suetens,et al. Metal streak artifacts in X-ray computed tomography: a simulation study , 1998, 1998 IEEE Nuclear Science Symposium Conference Record. 1998 IEEE Nuclear Science Symposium and Medical Imaging Conference (Cat. No.98CH36255).
[22] Toby P. Breckon,et al. The Good, the Bad and the Ugly: Evaluating Convolutional Neural Networks for Prohibited Item Detection Using Real and Synthetically Composited X-ray Imagery , 2019, ArXiv.
[23] Rolf Adams,et al. Seeded Region Growing , 1994, IEEE Trans. Pattern Anal. Mach. Intell..
[24] Sos S. Agaian,et al. 3D threat image projection , 2008, Electronic Imaging.
[25] Victoria Cutler,et al. Use of threat image projection (TIP) to enhance security performance , 2009, 43rd Annual 2009 International Carnahan Conference on Security Technology.
[26] Toby P. Breckon,et al. GANomaly: Semi-Supervised Anomaly Detection via Adversarial Training , 2018, ACCV.
[27] Johan Nuyts,et al. An experimental survey of metal artefact reduction in computed tomography. , 2013, Journal of X-ray science and technology.
[28] E. Dubois,et al. Digital picture processing , 1985, Proceedings of the IEEE.
[29] Lewis D. Griffin,et al. Threat Image Projection (TIP) into X-ray images of cargo containers for training humans and machines , 2016, 2016 IEEE International Carnahan Conference on Security Technology (ICCST).
[30] Fiona Donald,et al. CCTV: A challenging case for threat image projection implementation , 2015 .
[31] Ken Shoemake,et al. Animating rotation with quaternion curves , 1985, SIGGRAPH.
[32] Najla Megherbi Bouallagu,et al. Fully automatic 3D Threat Image Projection: Application to densely cluttered 3D Computed Tomography baggage images , 2012, 2012 3rd International Conference on Image Processing Theory, Tools and Applications (IPTA).