Datasets:
Tasks:
Object Detection
Modalities:
Image
Formats:
imagefolder
Languages:
English
Size:
1K - 10K
ArXiv:
License:
Update README.md
Browse files
README.md
CHANGED
@@ -64,7 +64,7 @@ dataset_summary: '
|
|
64 |
|
65 |
# Dataset Card for pidray
|
66 |
|
67 |
-
|
68 |
|
69 |
|
70 |
|
@@ -101,130 +101,46 @@ session = fo.launch_app(dataset)
|
|
101 |
|
102 |
### Dataset Description
|
103 |
|
104 |
-
|
|
|
|
|
105 |
|
106 |
|
107 |
|
108 |
-
- **Curated by:** [More Information Needed]
|
109 |
-
- **Funded by [optional]:** [More Information Needed]
|
110 |
-
- **Shared by [optional]:** [More Information Needed]
|
111 |
- **Language(s) (NLP):** en
|
112 |
- **License:** apache-2.0
|
|
|
113 |
|
114 |
-
|
115 |
|
116 |
-
|
117 |
|
118 |
-
|
119 |
-
- **Paper [optional]:** [More Information Needed]
|
120 |
-
- **Demo [optional]:** [More Information Needed]
|
121 |
|
122 |
-
|
123 |
-
|
124 |
-
<!-- Address questions around how the dataset is intended to be used. -->
|
125 |
-
|
126 |
-
### Direct Use
|
127 |
-
|
128 |
-
<!-- This section describes suitable use cases for the dataset. -->
|
129 |
-
|
130 |
-
[More Information Needed]
|
131 |
-
|
132 |
-
### Out-of-Scope Use
|
133 |
-
|
134 |
-
<!-- This section addresses misuse, malicious use, and uses that the dataset will not work well for. -->
|
135 |
-
|
136 |
-
[More Information Needed]
|
137 |
-
|
138 |
-
## Dataset Structure
|
139 |
-
|
140 |
-
<!-- This section provides a description of the dataset fields, and additional information about the dataset structure such as criteria used to create the splits, relationships between data points, etc. -->
|
141 |
-
|
142 |
-
[More Information Needed]
|
143 |
-
|
144 |
-
## Dataset Creation
|
145 |
-
|
146 |
-
### Curation Rationale
|
147 |
-
|
148 |
-
<!-- Motivation for the creation of this dataset. -->
|
149 |
-
|
150 |
-
[More Information Needed]
|
151 |
-
|
152 |
-
### Source Data
|
153 |
-
|
154 |
-
<!-- This section describes the source data (e.g. news text and headlines, social media posts, translated sentences, ...). -->
|
155 |
-
|
156 |
-
#### Data Collection and Processing
|
157 |
-
|
158 |
-
<!-- This section describes the data collection and processing process such as data selection criteria, filtering and normalization methods, tools and libraries used, etc. -->
|
159 |
-
|
160 |
-
[More Information Needed]
|
161 |
-
|
162 |
-
#### Who are the source data producers?
|
163 |
-
|
164 |
-
<!-- This section describes the people or systems who originally created the data. It should also include self-reported demographic or identity information for the source data creators if this information is available. -->
|
165 |
|
166 |
-
[More Information Needed]
|
167 |
|
168 |
-
|
169 |
-
|
170 |
-
<!-- If the dataset contains annotations which are not part of the initial data collection, use this section to describe them. -->
|
171 |
-
|
172 |
-
#### Annotation process
|
173 |
-
|
174 |
-
<!-- This section describes the annotation process such as annotation tools used in the process, the amount of data annotated, annotation guidelines provided to the annotators, interannotator statistics, annotation validation, etc. -->
|
175 |
-
|
176 |
-
[More Information Needed]
|
177 |
-
|
178 |
-
#### Who are the annotators?
|
179 |
-
|
180 |
-
<!-- This section describes the people or systems who created the annotations. -->
|
181 |
-
|
182 |
-
[More Information Needed]
|
183 |
-
|
184 |
-
#### Personal and Sensitive Information
|
185 |
-
|
186 |
-
<!-- State whether the dataset contains data that might be considered personal, sensitive, or private (e.g., data that reveals addresses, uniquely identifiable names or aliases, racial or ethnic origins, sexual orientations, religious beliefs, political opinions, financial or health data, etc.). If efforts were made to anonymize the data, describe the anonymization process. -->
|
187 |
-
|
188 |
-
[More Information Needed]
|
189 |
-
|
190 |
-
## Bias, Risks, and Limitations
|
191 |
-
|
192 |
-
<!-- This section is meant to convey both technical and sociotechnical limitations. -->
|
193 |
-
|
194 |
-
[More Information Needed]
|
195 |
-
|
196 |
-
### Recommendations
|
197 |
-
|
198 |
-
<!-- This section is meant to convey recommendations with respect to the bias, risk, and technical limitations. -->
|
199 |
-
|
200 |
-
Users should be made aware of the risks, biases and limitations of the dataset. More information needed for further recommendations.
|
201 |
-
|
202 |
-
## Citation [optional]
|
203 |
-
|
204 |
-
<!-- If there is a paper or blog post introducing the dataset, the APA and Bibtex information for that should go in this section. -->
|
205 |
-
|
206 |
-
**BibTeX:**
|
207 |
-
|
208 |
-
[More Information Needed]
|
209 |
|
210 |
-
|
211 |
|
212 |
-
[More Information Needed]
|
213 |
|
214 |
-
## Glossary [optional]
|
215 |
|
216 |
-
|
217 |
|
218 |
-
|
219 |
|
220 |
-
## More Information [optional]
|
221 |
|
222 |
-
[More Information Needed]
|
223 |
|
224 |
-
## Dataset Card Authors [optional]
|
225 |
|
226 |
-
|
227 |
|
228 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
229 |
|
230 |
-
[More Information Needed]
|
|
|
64 |
|
65 |
# Dataset Card for pidray
|
66 |
|
67 |
+
PIDray is a large-scale dataset which covers various cases in real-world scenarios for prohibited item detection, especially for deliberately hidden items. The dataset contains 12 categories of prohibited items in 47, 677 X-ray images with high-quality annotated segmentation masks and bounding boxes.
|
68 |
|
69 |
|
70 |
|
|
|
101 |
|
102 |
### Dataset Description
|
103 |
|
104 |
+
From _Towards Real-World Prohibited Item Detection: A Large-Scale X-ray Benchmark_:
|
105 |
+
Automatic security inspection using computer vision technology is a challenging task in real-world scenarios due to various factors, including intra-class variance, class imbalance, and occlusion. Most of the previous methods rarely solve the cases that the prohibited items are deliberately hidden in messy objects due to the lack of large-scale datasets, restricted their applications in real-world scenarios. Towards real-world prohibited item detection, we collect a large-scale dataset, named as PIDray, which covers various cases in real-world scenarios for prohibited item detection, especially for deliberately hidden items. With an intensive amount of effort, our dataset contains
|
106 |
+
categories of prohibited items in X-ray images with high-quality annotated segmentation masks and bounding boxes. To the best of our knowledge, it is the largest prohibited items detection dataset to date. Meanwhile, we design the selective dense attention network (SDANet) to construct a strong baseline, which consists of the dense attention module and the dependency refinement module. The dense attention module formed by the spatial and channel-wise dense attentions, is designed to learn the discriminative features to boost the performance. The dependency refinement module is used to exploit the dependencies of multi-scale features. Extensive experiments conducted on the collected PIDray dataset demonstrate that the proposed method performs favorably against the state-of-the-art methods, especially for detecting the deliberately hidden items.
|
107 |
|
108 |
|
109 |
|
|
|
|
|
|
|
110 |
- **Language(s) (NLP):** en
|
111 |
- **License:** apache-2.0
|
112 |
+
The images and the corresponding annotations in PIDray Dataset can be used ONLY for academic purposes, NOT for commercial purposes.
|
113 |
|
114 |
+
Copyright © 2021 Institute of Software Chinese Academy of Sciences, University of Chinese Academy of Sciences
|
115 |
|
116 |
+
All rights reserved.
|
117 |
|
118 |
+
### Dataset Sources
|
|
|
|
|
119 |
|
120 |
+
- **Repository:** https://github.com/bywang2018/security-dataset
|
121 |
+
- **Paper [optional]:** https://arxiv.org/abs/2108.07020
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
122 |
|
|
|
123 |
|
124 |
+
## Uses
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
125 |
|
126 |
+
This used for academic research on airport security screening machines and the detection of objects being scanned.
|
127 |
|
|
|
128 |
|
|
|
129 |
|
130 |
+
### Out-of-Scope Use
|
131 |
|
132 |
+
Any non-academic work is out of scope and prohibited.
|
133 |
|
|
|
134 |
|
|
|
135 |
|
|
|
136 |
|
137 |
+
## Citation
|
138 |
|
139 |
+
@inproceedings{wang2021towards,
|
140 |
+
title={Towards Real-World Prohibited Item Detection: A Large-Scale X-ray Benchmark},
|
141 |
+
author={Wang, Boying and Zhang, Libo and Wen, Longyin and Liu, Xianglong and Wu, Yanjun},
|
142 |
+
booktitle={Proceedings of the IEEE/CVF International Conference on Computer Vision},
|
143 |
+
pages={5412--5421},
|
144 |
+
year={2021}
|
145 |
+
}
|
146 |
|
|