Skip to main content

ORIGINAL RESEARCH article

Front. Artif. Intell.
Sec. AI in Business
Volume 8 - 2025 | doi: 10.3389/frai.2025.1518850
This article is part of the Research Topic Deep Learning for Industrial Applications View all articles

Application of human-in-the-loop hybrid augmented intelligence approach in security inspection system

Provisionally accepted
  • 1 First Research Institute of the Ministry of Public Security of People’s Republic of China, Beijing, China
  • 2 ZhongDun AnMin, Beijing, China

The final, formatted version of the article will be published soon.

    A proposed human-in-the-loop hybrid augmented intelligence approach addresses the practical needs of security inspection systems by introducing a hybrid decisionmaking method that leverages two distinct strategies: "Reject-priority" and "Clearpriority." These strategies play complementary roles in bolstering the decision-making process's overall performance. Comparative experiments on a dataset from a specific security inspection site confirmed the hybrid method's effectiveness, drawing several conclusions. This "Hybrid decision-making" method not only enhances risk perception, thereby widening the safety margin of the security inspection system, but also reduces the need for human labor, leading to increased efficiency and reduced labor costs. Additionally, it is less time-consuming, further improving the system's overall efficiency. By integrating human and machine intelligence, this method significantly boosts decision-making effectiveness. Tailored to their unique characteristics, the method based on "Reject-priority" strategy is particularly well-suited for security inspection scenarios that demand stringent safety protocols, while the "Clear-priority" method is ideal for scenarios with high-volume traffic flow, where efficiency is paramount.

    Keywords: human machine collaboration, human-in-the-loop, Hybrid-augmented intelligence, security inspection, Contraband detection, Workload, Work efficiency, safety margin

    Received: 29 Oct 2024; Accepted: 09 Jan 2025.

    Copyright: © 2025 Huang, Wang, Zhang, Chen and Zhang. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

    * Correspondence: Hongji Zhang, ZhongDun AnMin, Beijing, China

    Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.