Datasets:

Modalities:
Image
Languages:
English
ArXiv:
Libraries:
Datasets
FiftyOne
License:
dgural commited on
Commit
6154c2e
1 Parent(s): a8e4d26

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +22 -106
README.md CHANGED
@@ -64,7 +64,7 @@ dataset_summary: '
64
 
65
  # Dataset Card for pidray
66
 
67
- <!-- Provide a quick summary of the dataset. -->
68
 
69
 
70
 
@@ -101,130 +101,46 @@ session = fo.launch_app(dataset)
101
 
102
  ### Dataset Description
103
 
104
- <!-- Provide a longer summary of what this dataset is. -->
 
 
105
 
106
 
107
 
108
- - **Curated by:** [More Information Needed]
109
- - **Funded by [optional]:** [More Information Needed]
110
- - **Shared by [optional]:** [More Information Needed]
111
  - **Language(s) (NLP):** en
112
  - **License:** apache-2.0
 
113
 
114
- ### Dataset Sources [optional]
115
 
116
- <!-- Provide the basic links for the dataset. -->
117
 
118
- - **Repository:** [More Information Needed]
119
- - **Paper [optional]:** [More Information Needed]
120
- - **Demo [optional]:** [More Information Needed]
121
 
122
- ## Uses
123
-
124
- <!-- Address questions around how the dataset is intended to be used. -->
125
-
126
- ### Direct Use
127
-
128
- <!-- This section describes suitable use cases for the dataset. -->
129
-
130
- [More Information Needed]
131
-
132
- ### Out-of-Scope Use
133
-
134
- <!-- This section addresses misuse, malicious use, and uses that the dataset will not work well for. -->
135
-
136
- [More Information Needed]
137
-
138
- ## Dataset Structure
139
-
140
- <!-- This section provides a description of the dataset fields, and additional information about the dataset structure such as criteria used to create the splits, relationships between data points, etc. -->
141
-
142
- [More Information Needed]
143
-
144
- ## Dataset Creation
145
-
146
- ### Curation Rationale
147
-
148
- <!-- Motivation for the creation of this dataset. -->
149
-
150
- [More Information Needed]
151
-
152
- ### Source Data
153
-
154
- <!-- This section describes the source data (e.g. news text and headlines, social media posts, translated sentences, ...). -->
155
-
156
- #### Data Collection and Processing
157
-
158
- <!-- This section describes the data collection and processing process such as data selection criteria, filtering and normalization methods, tools and libraries used, etc. -->
159
-
160
- [More Information Needed]
161
-
162
- #### Who are the source data producers?
163
-
164
- <!-- This section describes the people or systems who originally created the data. It should also include self-reported demographic or identity information for the source data creators if this information is available. -->
165
 
166
- [More Information Needed]
167
 
168
- ### Annotations [optional]
169
-
170
- <!-- If the dataset contains annotations which are not part of the initial data collection, use this section to describe them. -->
171
-
172
- #### Annotation process
173
-
174
- <!-- This section describes the annotation process such as annotation tools used in the process, the amount of data annotated, annotation guidelines provided to the annotators, interannotator statistics, annotation validation, etc. -->
175
-
176
- [More Information Needed]
177
-
178
- #### Who are the annotators?
179
-
180
- <!-- This section describes the people or systems who created the annotations. -->
181
-
182
- [More Information Needed]
183
-
184
- #### Personal and Sensitive Information
185
-
186
- <!-- State whether the dataset contains data that might be considered personal, sensitive, or private (e.g., data that reveals addresses, uniquely identifiable names or aliases, racial or ethnic origins, sexual orientations, religious beliefs, political opinions, financial or health data, etc.). If efforts were made to anonymize the data, describe the anonymization process. -->
187
-
188
- [More Information Needed]
189
-
190
- ## Bias, Risks, and Limitations
191
-
192
- <!-- This section is meant to convey both technical and sociotechnical limitations. -->
193
-
194
- [More Information Needed]
195
-
196
- ### Recommendations
197
-
198
- <!-- This section is meant to convey recommendations with respect to the bias, risk, and technical limitations. -->
199
-
200
- Users should be made aware of the risks, biases and limitations of the dataset. More information needed for further recommendations.
201
-
202
- ## Citation [optional]
203
-
204
- <!-- If there is a paper or blog post introducing the dataset, the APA and Bibtex information for that should go in this section. -->
205
-
206
- **BibTeX:**
207
-
208
- [More Information Needed]
209
 
210
- **APA:**
211
 
212
- [More Information Needed]
213
 
214
- ## Glossary [optional]
215
 
216
- <!-- If relevant, include terms and calculations in this section that can help readers understand the dataset or dataset card. -->
217
 
218
- [More Information Needed]
219
 
220
- ## More Information [optional]
221
 
222
- [More Information Needed]
223
 
224
- ## Dataset Card Authors [optional]
225
 
226
- [More Information Needed]
227
 
228
- ## Dataset Card Contact
 
 
 
 
 
 
229
 
230
- [More Information Needed]
 
64
 
65
  # Dataset Card for pidray
66
 
67
+ PIDray is a large-scale dataset which covers various cases in real-world scenarios for prohibited item detection, especially for deliberately hidden items. The dataset contains 12 categories of prohibited items in 47, 677 X-ray images with high-quality annotated segmentation masks and bounding boxes.
68
 
69
 
70
 
 
101
 
102
  ### Dataset Description
103
 
104
+ From _Towards Real-World Prohibited Item Detection: A Large-Scale X-ray Benchmark_:
105
+ Automatic security inspection using computer vision technology is a challenging task in real-world scenarios due to various factors, including intra-class variance, class imbalance, and occlusion. Most of the previous methods rarely solve the cases that the prohibited items are deliberately hidden in messy objects due to the lack of large-scale datasets, restricted their applications in real-world scenarios. Towards real-world prohibited item detection, we collect a large-scale dataset, named as PIDray, which covers various cases in real-world scenarios for prohibited item detection, especially for deliberately hidden items. With an intensive amount of effort, our dataset contains
106
+ categories of prohibited items in X-ray images with high-quality annotated segmentation masks and bounding boxes. To the best of our knowledge, it is the largest prohibited items detection dataset to date. Meanwhile, we design the selective dense attention network (SDANet) to construct a strong baseline, which consists of the dense attention module and the dependency refinement module. The dense attention module formed by the spatial and channel-wise dense attentions, is designed to learn the discriminative features to boost the performance. The dependency refinement module is used to exploit the dependencies of multi-scale features. Extensive experiments conducted on the collected PIDray dataset demonstrate that the proposed method performs favorably against the state-of-the-art methods, especially for detecting the deliberately hidden items.
107
 
108
 
109
 
 
 
 
110
  - **Language(s) (NLP):** en
111
  - **License:** apache-2.0
112
+ The images and the corresponding annotations in PIDray Dataset can be used ONLY for academic purposes, NOT for commercial purposes.
113
 
114
+ Copyright © 2021 Institute of Software Chinese Academy of Sciences, University of Chinese Academy of Sciences
115
 
116
+ All rights reserved.
117
 
118
+ ### Dataset Sources
 
 
119
 
120
+ - **Repository:** https://github.com/bywang2018/security-dataset
121
+ - **Paper [optional]:** https://arxiv.org/abs/2108.07020
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
122
 
 
123
 
124
+ ## Uses
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
125
 
126
+ This used for academic research on airport security screening machines and the detection of objects being scanned.
127
 
 
128
 
 
129
 
130
+ ### Out-of-Scope Use
131
 
132
+ Any non-academic work is out of scope and prohibited.
133
 
 
134
 
 
135
 
 
136
 
137
+ ## Citation
138
 
139
+ @inproceedings{wang2021towards,
140
+ title={Towards Real-World Prohibited Item Detection: A Large-Scale X-ray Benchmark},
141
+ author={Wang, Boying and Zhang, Libo and Wen, Longyin and Liu, Xianglong and Wu, Yanjun},
142
+ booktitle={Proceedings of the IEEE/CVF International Conference on Computer Vision},
143
+ pages={5412--5421},
144
+ year={2021}
145
+ }
146