{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:00:32Z","timestamp":1740099632616,"version":"3.37.3"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030412982"},{"type":"electronic","value":"9783030412999"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-41299-9_14","type":"book-chapter","created":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T04:02:51Z","timestamp":1582344171000},"page":"169-183","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimal Rejection Function Meets Character Recognition Tasks"],"prefix":"10.1007","author":[{"given":"Xiaotong","family":"Ji","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3093-6929","authenticated-orcid":false,"given":"Yuchen","family":"Zheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8901-9063","authenticated-orcid":false,"given":"Daiki","family":"Suehiro","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8592-7566","authenticated-orcid":false,"given":"Seiichi","family":"Uchida","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,23]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D. Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: CVPR (2015)","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"14_CR2","unstructured":"Sun, Y., Liang, D., Wang, X., Tang, X.: DeepiD3: face recognition with very deep neural networks. arXiv preprint \narXiv:1502.00873\n\n (2015)"},{"key":"14_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10462-012-9356-9","volume":"43","author":"SS Rautaray","year":"2015","unstructured":"Rautaray, S.S., Agrawal, A.: Vision based hand gesture recognition for human computer interaction: a survey. Artif. Intell. Rev. 43, 1\u201354 (2015)","journal-title":"Artif. Intell. Rev."},{"issue":"3","key":"14_CR4","doi-asserted-by":"publisher","first-page":"990","DOI":"10.1016\/j.eswa.2014.09.020","volume":"42","author":"R Rouhi","year":"2015","unstructured":"Rouhi, R., Jafari, M., Kasaei, S., Keshavarzian, P.: Benign andmalignantbreast tumors classification based on region growing and cnn segmentation. Expert Syst. Appl. 42(3), 990\u20131002 (2015)","journal-title":"Expert Syst. Appl."},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Yang, Z., Yang, D., Dyer, C., He, X. Smola, A., Hovy, E.: Hierarchical attention networks for document classification. In: Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (2016)","DOI":"10.18653\/v1\/N16-1174"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"2321","DOI":"10.1109\/JSTARS.2015.2510032","volume":"9","author":"F Condessa","year":"2016","unstructured":"Condessa, F., Bioucas-Dias, J., Kova\u010devi\u0107, J.: Supervised hyperspectral image classification with rejection. IEEE J. Sel. Top. Appl. Earth Observ. Remote Sens. 9, 2321\u20132332 (2016)","journal-title":"IEEE J. Sel. Top. Appl. Earth Observ. Remote Sens."},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2016.12.007","volume":"72","author":"LB Marinho","year":"2017","unstructured":"Marinho, L.B., Almeida, J.S., Souza, J.W.M., Albuquerque, V.H.C., Rebou\u00e7as Filho, P.P.: A novel mobile robot localization approach based on topological maps using classification with reject option in omnidirectional images. Expert Syst. Appl. 72, 1\u201317 (2017)","journal-title":"Expert Syst. Appl."},{"key":"14_CR8","first-page":"1823","volume":"9","author":"PL Bartlett","year":"2008","unstructured":"Bartlett, P.L., Wegkamp, M.H.: Classification with a rejectoption using ahinge loss. J. Mach. Learn. Res. 9, 1823\u20131840 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-319-46379-7_5","volume-title":"Algorithmic Learning Theory","author":"C Cortes","year":"2016","unstructured":"Cortes, C., DeSalvo, G., Mohri, M.: Learning with rejection. In: Ortner, R., Simon, H.U., Zilles, S. (eds.) ALT 2016. LNCS (LNAI), vol. 9925, pp. 67\u201382. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-46379-7_5"},{"key":"14_CR10","first-page":"9","volume":"2","author":"MA Hern\u00e1ndez","year":"1998","unstructured":"Hern\u00e1ndez, M.A., Stolfo, S.J.: Real-world data is dirty: data cleansing and the merge\/purge problem. DMKD 2, 9\u201337 (1998)","journal-title":"DMKD"},{"key":"14_CR11","unstructured":"Maletic, J.I., Marcus, A.: Data cleansing: beyond integrity analysis. In: IQ (2000)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Khayyat, Z., et al.: BigDansing: a system for big data cleansing. In: SIGMOD (2015)","DOI":"10.1145\/2723372.2747646"},{"key":"14_CR13","first-page":"1049","volume":"18","author":"TM Lehmann","year":"1999","unstructured":"Lehmann, T.M., Gonner, C., Spitzer, K.: Survey: interpolation methods in medical image processing. TMI 18, 1049\u20131075 (1999)","journal-title":"TMI"},{"key":"14_CR14","unstructured":"McAuliffe, M.J., Lalonde, F.M., McGarry, D, Gandler, W., Csaky, K., Trus, B.L.: Medical image processing, analysis and visualization in clinical research. In: CBMS (2001)"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Neumann, L., Matas, J.: Efficient scene text localization and recognition with local character refinement. In: ICDAR (2015)","DOI":"10.1109\/ICDAR.2015.7333861"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Messina,R., Louradour, J.: Segmentation-free handwritten chinese text recognition with LSTM-RNN. In: ICDAR (2015)","DOI":"10.1109\/ICDAR.2015.7333746"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Chen, K., Seuret, M., Liwicki, M., Hennebert, J., Ingold, R.: Page segmentation of historical document images with convolutional autoencoders. In: ICDAR (2015)","DOI":"10.1109\/ICDAR.2015.7333914"},{"issue":"4","key":"14_CR18","first-page":"3","volume":"23","author":"E Rahm","year":"2000","unstructured":"Rahm, E., Do, H.H.: Data cleaning: problems and current approaches. Data Eng. Bull. 23(4), 3\u201313 (2000)","journal-title":"Data Eng. Bull."},{"issue":"4","key":"14_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2641575","volume":"5","author":"M Mezzanzanica","year":"2015","unstructured":"Mezzanzanica, M., Boselli, R., Cesarini, M., Mercorio, F.: A model-based approach for developing data cleansing solutions. JDIQ 5(4), 1\u201328 (2015)","journal-title":"JDIQ"},{"key":"14_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1007\/3-540-48309-8_70","volume-title":"Database and Expert Systems Applications","author":"ML Lee","year":"1999","unstructured":"Lee, M.L., Lu, H., Ling, T.W., Ko, Y.T.: Cleansing data for mining and warehousing. In: Bench-Capon, T.J.M., Soda, G., Tjoa, A.M. (eds.) DEXA 1999. LNCS, vol. 1677, pp. 751\u2013760. Springer, Heidelberg (1999). \nhttps:\/\/doi.org\/10.1007\/3-540-48309-8_70"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Chen, H., Ku, W.-S., Wang, H., Sun, M.-T.: Leveraging spatio-temporal redundancy for RFID data cleansing. In: SIGMOD (2010)","DOI":"10.1145\/1807167.1807176"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Fecker, D., Asi, A., Pantke, W., M\u00e4rgner, V., El-Sana, J., Fingscheidt, T.: Document Writer analysis with rejection for historical Arabic manuscripts. In: ICFHR (2014)","DOI":"10.1109\/ICFHR.2014.130"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Pal, U., Sharma, N., Wakabayashi, T., Kimura, F.: Off-line handwritten character recognition of Devnagari Script. In: ICDAR (2007)","DOI":"10.1109\/ICDAR.2007.4378759"},{"key":"14_CR24","unstructured":"LeCun, Y., et al.: Handwritten digit recognition with a back-propagation network. In: NIPS (1990)"},{"key":"14_CR25","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/S1361-8415(00)00041-4","volume":"5","author":"SD Olabarriaga","year":"2001","unstructured":"Olabarriaga, S.D., Smeulders, A.W.: Interaction in thesegmentation ofmedical images: a survey. Med. Image Anal. 5, 127\u2013142 (2001)","journal-title":"Med. Image Anal."},{"issue":"2","key":"14_CR26","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.cmpb.2015.08.001","volume":"122","author":"A Mekhmoukh","year":"2015","unstructured":"Mekhmoukh, A., Mokrani, K.: Improved fuzzy C-means based particle swarm optimization (PSO) initialization and outlier rejection with level setmethods for MR brain image segmentation. Comput. Methods Program. Biomed. 122(2), 266\u2013281 (2015)","journal-title":"Comput. Methods Program. Biomed."},{"issue":"12","key":"14_CR27","first-page":"5017","volume":"24","author":"T-H Chan","year":"2015","unstructured":"Chan, T.-H., Jia, K., Gao, S., Lu, J., Zeng, Z., Ma, Y.: PCANet: a simple deep learning baseline for image classification? TIP 24(12), 5017\u20135032 (2015)","journal-title":"TIP"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Wang, J., Yang, J., Yu, K., Lv, F., Huang, T., Gong, Y.: Locality-constrained Linear Coding for Image Classification. In: CVPR (2010)","DOI":"10.1109\/CVPR.2010.5540018"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Cire\u015fan, D., Meier, U., Schmidhuber, J.: Multi-column deep neural networks for image classification. arXiv preprint \narXiv:1202.2745\n\n (2012)","DOI":"10.1109\/CVPR.2012.6248110"},{"key":"14_CR30","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1016\/j.patcog.2014.08.010","volume":"48","author":"Y Kessentini","year":"2015","unstructured":"Kessentini, Y., Burger, T., Paquet, T.: A Dempster-Shafer theory based combination of handwriting recognition systems with multiple rejection strategies. Pattern Recogn. 48, 534\u2013544 (2015)","journal-title":"Pattern Recogn."},{"key":"14_CR31","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1016\/j.asoc.2016.06.023","volume":"49","author":"DP Mesquita","year":"2016","unstructured":"Mesquita, D.P., Rocha, L.S., Gomes, J.P.P., Neto, A.R.R.: Classification with reject option for software defect prediction. Appl. Soft Comput. 49, 1085\u20131093 (2016)","journal-title":"Appl. Soft Comput."},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"He, C.L., Lam, L., Suen, C.Y.: A novel rejection measurement in handwritten numeral recognition based on linear discriminant analysis. In: ICDAR (2009)","DOI":"10.1109\/ICDAR.2009.89"},{"issue":"4","key":"14_CR33","doi-asserted-by":"publisher","first-page":"1318","DOI":"10.1016\/j.patcog.2011.09.021","volume":"45","author":"X-X Niu","year":"2012","unstructured":"Niu, X.-X., Suen, C.Y.: A novel hybrid CNN-SVM classifier forrecognizinghandwritten digits. Pattern Recogn. 45(4), 1318\u20131325 (2012)","journal-title":"Pattern Recogn."},{"key":"14_CR34","doi-asserted-by":"crossref","unstructured":"Maitra, D.S., Bhattacharya, U., Parui, S.K.: CNN based common approach to handwritten character recognition of multiple scripts. In: ICDAR (2015)","DOI":"10.1109\/ICDAR.2015.7333916"},{"key":"14_CR35","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.eswa.2016.01.001","volume":"51","author":"Y Serdouk","year":"2016","unstructured":"Serdouk, Y., Nemmour, H., Chibani, Y.: New off-line handwritten signature verification method based on artificial immune recognition system. Expert Syst. Appl. 51, 186\u2013194 (2016)","journal-title":"Expert Syst. Appl."},{"issue":"16","key":"14_CR36","doi-asserted-by":"publisher","first-page":"2005","DOI":"10.1016\/j.patrec.2006.06.002","volume":"27","author":"R Bertolami","year":"2006","unstructured":"Bertolami, R., Zimmermann, M., Bunke, H.: Rejection strategiesfor offline handwritten text line recognition. Pattern Recogn. Lett. 27(16), 2005\u20132012 (2006)","journal-title":"Pattern Recogn. Lett."},{"key":"14_CR37","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1049\/cje.2016.05.018","volume":"25","author":"P Li","year":"2016","unstructured":"Li, P., Peng, L., Wen, J.: Rejecting character recognition errors using CNN based confidence estimation. Chin. J. Electron. 25, 520\u2013526 (2016)","journal-title":"Chin. J. Electron."},{"key":"14_CR38","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.patcog.2016.12.005","volume":"66","author":"X Bai","year":"2017","unstructured":"Bai, X., Shi, B., Zhang, C., Cai, X., Qi, L.: Text\/Non-text image classification in the wild with convolutional neural networks. Pattern Recognition 66, 437\u2013446 (2017)","journal-title":"Pattern Recognition"},{"key":"14_CR39","unstructured":"Platt, J.C., Cristianini, N., Shawe-Taylor, J.: Large margin DAGs for multiclass classification. In: NIPS (2000)"},{"key":"14_CR40","first-page":"463","volume":"3","author":"PL Bartlett","year":"2003","unstructured":"Bartlett, P.L., Mendelson, S.: Rademacher and Gaussian complexities: risk bounds and structural results. JMLR 3, 463\u2013482 (2003)","journal-title":"JMLR"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-41299-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T04:07:33Z","timestamp":1582344453000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-41299-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030412982","9783030412999"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-41299-9_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"23 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Auckland","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Zealand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acpr2019a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.acpr2019.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"214","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"125","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"for ACPR 2019 Workshops volume accepted 17 full papers and 6 short papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}