SIXray: A Large-scale Security Inspection X-ray Benchmark for Prohibited Item Discovery in Overlapping Images

被引:213
作者
Miao, Caijing [1 ]
Xie, Lingxi [2 ,4 ]
Wan, Fang [1 ]
Su, Chi [3 ]
Liu, Hongye [3 ]
Jiao, Jianbin [1 ]
Ye, Qixiang [1 ,5 ]
机构
[1] Univ Chinese Acad Sci, Beijing, Peoples R China
[2] Johns Hopkins Univ, Baltimore, MD 21218 USA
[3] Kingsoft Cloud, Beijing, Peoples R China
[4] Huawei Inc, Noahs Ark Lab, Shanghai, Peoples R China
[5] Peng Cheng Lab, Shenzhen, Peoples R China
来源
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019) | 2019年
关键词
D O I
10.1109/CVPR.2019.00222
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a large-scale dataset and establish a baseline for prohibited item discovery in Security Inspection X-ray images. Our dataset, named SIXray, consists of 1,059,231 X-ray images, in which 6 classes of 8,929 prohibited items are manually annotated. It raises a brand new challenge of overlapping image data, meanwhile shares the same properties with existing datasets, including complex yet meaningless contexts and class imbalance. We propose an approach named class-balanced hierarchical refinement (CHR) to deal with these difficulties. CHR assumes that each input image is sampled from a mixture distribution, and that deep networks require an iterative process to infer image contents accurately. To accelerate, we insert reversed connections to different network backbones, delivering high-level visual cues to assist mid-level features. In addition, a class-balanced loss function is designed to maximally alleviate the noise introduced by easy negative samples. We evaluate CHR on SIXray with different ratios of positive/negative samples. Compared to the baselines, CHR enjoys a better ability of discriminating objects especially using mid-level features, which offers the possibility of using a weakly-supervised approach towards accurate object localization. In particular, the advantage of CHR is more significant in the scenarios with fewer positive training samples, which demonstrates its potential application in real-world security inspection.(1)
引用
收藏
页码:2114 / 2123
页数:10
相关论文
共 40 条
[1]  
Akçay S, 2016, IEEE IMAGE PROC, P1057, DOI 10.1109/ICIP.2016.7532519
[2]  
[Anonymous], 2015, ICLR
[3]  
[Anonymous], 2012, INT J COMPUT SCI ENG
[4]  
[Anonymous], PROC CVPR IEEE
[5]  
[Anonymous], 2015, Nature, DOI [10.1038/nature14539, DOI 10.1038/NATURE14539]
[6]  
[Anonymous], 2017, COMMUN ACM, DOI DOI 10.1145/3065386
[7]  
[Anonymous], 2017, CVPR, DOI DOI 10.1109/CVPR.2017.106
[8]  
[Anonymous], 2017, PROC IEEE C COMPUTER
[9]  
[Anonymous], 2017, P 31 AAAI C ART INT
[10]  
[Anonymous], PROC CVPR IEEE