📄4. Kalakou, S., V. Psaraki-Kalouptsidi, and F. Moura, Future airport terminals: New technologies promise capacity gains.Journal of Air Transport Management, 2015. 42: p. 203-212.
📄5. Butler, V. and R.W. Poole, Rethinking checked-baggage screening. 2002, Reason Public Policy Institute Los Angeles, CA.
📄6. Koldkjær, K.P., RFID for Baggage Handling and Tracking. Whitepaper, Lyngsoe Systems, 2017.
📄7. Albers, S. and V. Rundshagen, European airlines′ strategic responses to the COVID-19 pandemic (January-May, 2020).Journal of air transport management, 2020. 87: p. 101863.
📄8. Martin-Domingo, L. and J.C. Martín, Airport mobile internet an innovation. Journal of Air Transport Management, 2016. 55: p. 102-112.
📄9. Halpern, N., et al., Segmentation of passenger preferences for using digital technologies at airports in Norway. Journal of Air Transport Management, 2021. 91: p. 102005.
📄10. Gures, N., H. Inan, and S. Arslan, Assessing the self-service technology usage of Y-Generation in airline services. Journal of Air Transport Management, 2018. 71: p. 215-219.
📄11. Velayudhan, D., et al., Recent advances in baggage threat detection: A comprehensive and systematic survey. ACM Computing Surveys, 2022. 55(8): p. 1-38.
📄12. Alabsi, M.I. and A.Q. Gill, A review of passenger digital information privacy concerns in smart airports. IEEE Access, 2021. 9: p. 33769-33781.
📄13. Zhang, R., et al., Analysis of message attacks in aviation data-link communication. IEEE Access, 2017. 6: p. 455-463.
📄14. Cui, L., et al., Security and privacy in smart cities: Challenges and opportunities. IEEE access, 2018. 6: p. 46134-46145.
📄15. Mohammed, C.M. and S.R. Zeebaree, Sufficient comparison among cloud computing services: IaaS, PaaS, and SaaS: A review. International Journal of Science and Business, 2021. 5(2): p. 17-30.
📄16. Rajapaksha, A. and N. Jayasuriya, Smart airport: A review on future of the airport operation. Global Journal of Management and Business Research, 2020. 20(3): p. 25-34.
📄17. Viorescu, R., 2018 reform of eu data protection rules. European Journal of Law and Public Administration, 2017. 4(2): p. 27-39.
📄18. Dove, E.S., The EU general data protection regulation: implications for international scientific research in the digital era. Journal of Law, Medicine & Ethics, 2018. 46(4): p. 1013-1030.
📄19. Tikkinen-Piri, C., A. Rohunen, and J. Markkula, EU General Data Protection Regulation: Changes and implications for personal data collecting companies. Computer Law & Security Review, 2018. 34(1): p. 134-153.
📄20. Bodkhe, U., et al., Blockchain for industry 4.0: A comprehensive review. IEEE Access, 2020. 8: p. 79764-79800.
📄21. Koenig, F., P.A. Found, and M. Kumar, Innovative airport 4.0 condition-based maintenance system for baggage handling DCV systems. International Journal of Productivity and Performance Management, 2019. 68(3): p. 561-577.
📄22. Rizos, C., et al. Experimental results of Locata: A high accuracy indoor positioning system. in 2010 International Conference on Indoor Positioning and Indoor Navigation. 2010. IEEE.
📄23. Versichele, M., Sensing and making sense of crowd dynamics using bluetooth tracking: an application-oriented approach. 2014, Ghent University.
📄24. Abedi, N., A. Bhaskar, and E. Chung, Tracking spatio-temporal movement of human in terms of space utilization using Media-Access-Control address data. Applied Geography, 2014. 51: p. 72-81.
📄25. Shahbano, M. Abdullah, and K. Inayat, Robust baggage detection and classification based on local tri-directional pattern.International Journal of Internet Technology and Secured Transactions, 2022. 12(2): p. 91-102.
📄26. Zheng, L., Y. Yang, and A.G. Hauptmann, Person re-identification: Past, present and future. arXiv preprint arXiv:1610.02984, 2016.
📄27. Chen, Y.-C., et al., Person re-identification by camera correlation aware feature augmentation. IEEE transactions on pattern analysis and machine intelligence, 2017. 40(2): p. 392-408.
📄28. Gheissari, N., T.B. Sebastian, and R. Hartley. Person reidentification using spatiotemporal appearance. in 2006 IEEE computer society conference on computer vision and pattern recognition (CVPR'06). 2006. IEEE.
📄29. Ma, B., Y. Su, and F. Jurie. Bicov: a novel image representation for person re-identification and face verification. in British Machive Vision Conference. 2012.
📄30. Karanam, S., Y. Li, and R.J. Radke. Sparse re-id: Block sparsity for person re-identification. in Proceedings of the IEEE conference on computer vision and pattern recognition workshops. 2015.
📄31. Cho, Y.-J. and K.-J. Yoon. Improving person re-identification via pose-aware multi-shot matching. in Proceedings of the IEEE conference on computer vision and pattern recognition. 2016.
📄32. Wei, L., et al. Person transfer gan to bridge domain gap for person re-identification. in Proceedings of the IEEE conference on computer vision and pattern recognition. 2018.
📄33. Wang, X., Intelligent multi-camera video surveillance: A review. Pattern recognition letters, 2013. 34(1): p. 3-19.
📄34. Ye, M., et al., Person reidentification via ranking aggregation of similarity pulling and dissimilarity pushing. IEEE Transactions on Multimedia, 2016. 18(12): p. 2553-2566.
📄35. To, K., Reimagining the future of aviation with blockchain. Stern School of Business New York, 2020.
📄36. Comitz, P. and A. Kersch. Aviation analytics and the Internet of Things. in 2016 Integrated Communications Navigation and Surveillance (ICNS). 2016. IEEE.
📄37. Makhdoom, I., et al., Blockchain's adoption in IoT: The challenges, and a way forward. Journal of Network and Computer Applications, 2019. 125: p. 251-279.
📄38. Wang, X., et al., Survey on blockchain for Internet of Things. Computer Communications, 2019. 136: p. 10-29.
📄39. Lu, Y., The blockchain: State-of-the-art and research challenges. Journal of Industrial Information Integration, 2019. 15: p. 80-90.
📄40. Monrat, A.A., O. Schelén, and K. Andersson, A survey of blockchain from the perspectives of applications, challenges, and opportunities. IEEE Access, 2019. 7: p. 117134-117151.
📄41. Nguyen, D.C., et al., Integration of blockchain and cloud of things: Architecture, applications and challenges. IEEE Communications surveys & tutorials, 2020. 22(4): p. 2521-2549.
📄42. Novo, O., Blockchain meets IoT: An architecture for scalable access management in IoT. IEEE internet of things journal, 2018. 5(2): p. 1184-1195.
📄43. Javaid, M., et al., Blockchain technology applications for Industry 4.0: A literature-based review. Blockchain: Research and Applications, 2021. 2(4): p. 100027.
📄44. Marchesi, L., et al., A blockchain architecture for industrial applications. Blockchain: Research and Applications, 2022. 3(4): p. 100088.
📄45. Pal, S., A. Dorri, and R. Jurdak, Blockchain for IoT access control: Recent trends and future research directions. Journal of Network and Computer Applications, 2022. 203: p. 103371.
📄46. Manavalan, E. and K. Jayakrishna, A review of Internet of Things (IoT) embedded sustainable supply chain for industry 4.0 requirements. Computers & industrial engineering, 2019. 127: p. 925-953.
📄47. Kumar, M., et al., Enablers to achieve zero hunger through IoT and blockchain technology and transform the green food supply chain systems. Journal of Cleaner Production, 2023. 405: p. 136894.
📄48. Ahmad, R.W., et al., The role of blockchain technology in aviation industry. IEEE Aerospace and Electronic Systems Magazine, 2021. 36(3): p. 4-15.
📄49. Tang, X., et al. Pyramidbox: A context-assisted single shot face detector. in Proceedings of the European conference on computer vision (ECCV). 2018.
📄50. Wang, D., C. Otto, and A.K. Jain, Face search at scale. IEEE transactions on pattern analysis and machine intelligence, 2016. 39(6): p. 1122-1136.
📄51. Liu, J., et al., Targeting ultimate accuracy: Face recognition via deep embedding. arXiv preprint arXiv:1506.07310, 2015.
📄52. Cao, Q., et al. Vggface2: A dataset for recognising faces across pose and age. in 2018 13th IEEE international conference on automatic face & gesture recognition (FG 2018). 2018. IEEE.
📄53. Yang, S., et al. Wider face: A face detection benchmark. in Proceedings of the IEEE conference on computer vision and pattern recognition. 2016.
📄55. Ren, S., et al., Faster r-cnn: Towards real-time object detection with region proposal networks. Advances in neural information processing systems, 2015. 28.
📄56. Redmon, J., et al. You only look once: Unified, real-time object detection. in Proceedings of the IEEE conference on computer vision and pattern recognition. 2016.
📄57. Lin, T.-Y., et al. Focal loss for dense object detection. in Proceedings of the IEEE international conference on computer vision. 2017.
📄58. He, K., et al. Mask r-cnn. in Proceedings of the IEEE international conference on computer vision. 2017.
📄59. Jiang, P., et al., A Review of Yolo algorithm developments. Procedia Computer Science, 2022. 199: p. 1066-1073.
📄60. Redmon, J. and A. Farhadi, Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767, 2018.
📄62. Bai, Y., et al., Learning high-level image representation for image retrieval via multi-task dnn using clickthrough data. arXiv preprint arXiv:1312.4740, 2013.
📄63. Zhang, J. and Y. Peng, SSDH: Semi-supervised deep hashing for large scale image retrieval. IEEE Transactions on Circuits and Systems for Video Technology, 2017. 29(1): p. 212-225.
📄64. Abeyratne, R. and R. Abeyratne, Blockchain and aviation. Aviation in the Digital Age: Legal and Regulatory Aspects, 2020: p. 109-120.
📄66. Hassan, T., et al., Tensor pooling-driven instance segmentation framework for baggage threat recognition. Neural Computing and Applications, 2022: p. 1-12.
📄67. Marchesi, L., M. Marchesi, and R. Tonelli, Abcde–agile block chain dapp engineering. Blockchain: Research and Applications 1 (1), 100002(2020). 2020.
📄68. Fahmideh, M., et al., Engineering Blockchain-based Software Systems: Foundations, Survey, and Future Directions. ACM Computing Surveys, 2022. 55(6): p. 1-44.
📄69. Six, N., N. Herbaut, and C. Salinesi, Blockchain software patterns for the design of decentralized applications: A systematic literature review. Blockchain: Research and Applications, 2022. 3(2): p. 100061.