{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:43:20Z","timestamp":1743054200445,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030616373"},{"type":"electronic","value":"9783030616380"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-61638-0_30","type":"book-chapter","created":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T23:08:28Z","timestamp":1602630508000},"page":"545-563","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Unsupervised Labelling of Stolen Handwritten Digit Embeddings with Density Matching"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8953-7872","authenticated-orcid":false,"given":"Thomas","family":"Thebaud","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1493-5777","authenticated-orcid":false,"given":"Ga\u00ebl","family":"Le Lan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4398-0224","authenticated-orcid":false,"given":"Anthony","family":"Larcher","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,14]]},"reference":[{"key":"30_CR1","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1109\/TAC.1974.1100705","volume":"19","author":"H Akaike","year":"1974","unstructured":"Akaike, H.: A new look at the statistical identification model. IEEE Trans. Autom. Control 19, 716 (1974)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"9","key":"30_CR2","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1109\/TPAMI.2007.1087","volume":"29","author":"R Cappelli","year":"2007","unstructured":"Cappelli, R., Maio, D., Lumini, A., Maltoni, D.: Fingerprint image reconstruction from standard templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(9), 1489\u20131503 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"30_CR3","unstructured":"Conneau, A., Lample, G., Ranzato, M.A., Denoyer, L., J\u00e9gou, H.: Word translation without parallel data. arXiv preprint \narXiv:1710.04087\n\n (2017)"},{"issue":"5123","key":"30_CR4","doi-asserted-by":"publisher","first-page":"872","DOI":"10.1126\/science.8346439","volume":"261","author":"S Forrest","year":"1993","unstructured":"Forrest, S.: Genetic algorithms: principles of natural selection applied to computation. Science 261(5123), 872\u2013878 (1993)","journal-title":"Science"},{"issue":"10","key":"30_CR5","doi-asserted-by":"publisher","first-page":"1512","DOI":"10.1016\/j.cviu.2013.06.003","volume":"117","author":"J Galbally","year":"2013","unstructured":"Galbally, J., Ross, A., Gomez-Barrero, M., Fierrez, J., Ortega-Garcia, J.: Iris image reconstruction from binary templates: an efficient probabilistic approach based on genetic algorithms. Comput. Vis. Image Underst. 117(10), 1512\u20131525 (2013)","journal-title":"Comput. Vis. Image Underst."},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Glavas, G., Litschko, R., Ruder, S., Vulic, I.: How to (properly) evaluate cross-lingual word embeddings: on strong baselines, comparative analyses, and some misconceptions. arXiv preprint \narXiv:1902.00508\n\n (2019)","DOI":"10.18653\/v1\/P19-1070"},{"key":"30_CR7","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, pp. 2672\u20132680 (2014)"},{"issue":"1","key":"30_CR8","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/BF02291478","volume":"40","author":"JC Gower","year":"1975","unstructured":"Gower, J.C.: Generalized Procrustes analysis. Psychometrika 40(1), 33\u201351 (1975). \nhttps:\/\/doi.org\/10.1007\/BF02291478","journal-title":"Psychometrika"},{"key":"30_CR9","unstructured":"Grave, E., Joulin, A., Berthet, Q.: Unsupervised alignment of embeddings with Wasserstein Procrustes. arXiv preprint \narXiv:1805.11222\n\n (2018)"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Hoshen, Y., Wolf, L.: Non-adversarial unsupervised word translation. arXiv preprint \narXiv:1801.06126\n\n (2018)","DOI":"10.18653\/v1\/D18-1043"},{"key":"30_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2008\/579416","volume":"2008","author":"AK Jain","year":"2008","unstructured":"Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process. 2008, 1\u201317 (2008)","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"30_CR12","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint \narXiv:1412.6980\n\n (2014)"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Le Lan, G., Frey, V.: Securing smartphone handwritten pin codes with recurrent neural networks. In: ICASSP 2019\u20132019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2612\u20132616. IEEE (2019)","DOI":"10.1109\/ICASSP.2019.8683871"},{"key":"30_CR14","unstructured":"Lee, L., Grimson, W.E.L.: Gait analysis for recognition and classification. In: Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition, pp. 155\u2013162. IEEE (2002)"},{"issue":"5","key":"30_CR15","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1109\/TPAMI.2018.2827389","volume":"41","author":"G Mai","year":"2018","unstructured":"Mai, G., Cao, K., Yuen, P.C., Jain, A.K.: On the reconstruction of face images from deep face templates. IEEE Trans. Pattern Anal. Mach. Intell. 41(5), 1188\u20131202 (2018)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"30_CR16","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint \narXiv:1301.3781\n\n (2013)"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Reynolds, D.A.: Gaussian mixture models. In: Encyclopedia of Biometrics, vol. 741 (2009)","DOI":"10.1007\/978-0-387-73003-5_196"},{"key":"30_CR18","unstructured":"Rezende, D.J., Mohamed, S.: Variational inference with normalizing flows. arXiv preprint \narXiv:1505.05770\n\n (2015)"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Snyder, D., Garcia-Romero, D., Sell, G., Povey, D., Khudanpur, S.: X-vectors: robust DNN embeddings for speaker recognition. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 5329\u20135333. IEEE (2018)","DOI":"10.1109\/ICASSP.2018.8461375"},{"issue":"7","key":"30_CR20","doi-asserted-by":"publisher","first-page":"1532","DOI":"10.1109\/TMC.2019.2911506","volume":"19","author":"R Tolosana","year":"2019","unstructured":"Tolosana, R., Vera-Rodriguez, R., Fierrez, J.: BioTouchPass: handwritten passwords for touchscreen biometrics. IEEE Trans. Mob. Comput. 19(7), 1532\u20131543 (2019)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"30_CR21","doi-asserted-by":"crossref","unstructured":"Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Ortega-Garcia, J.: Incorporating touch biometrics to mobile one-time passwords: exploration of digits. In: The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, June 2018","DOI":"10.1109\/CVPRW.2018.00088"},{"issue":"4","key":"30_CR22","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1137\/1118101","volume":"18","author":"SS Vallender","year":"1974","unstructured":"Vallender, S.S.: Calculation of the Wasserstein distance between probability distributions on the line. Theory Probab. Appl. 18(4), 784\u2013786 (1974)","journal-title":"Theory Probab. Appl."},{"issue":"2","key":"30_CR23","doi-asserted-by":"publisher","first-page":"141","DOI":"10.3390\/sym11020141","volume":"11","author":"W Yang","year":"2019","unstructured":"Yang, W., Wang, S., Hu, J., Zheng, G., Valli, C.: Security and accuracy of fingerprint-based biometrics: a review. Symmetry 11(2), 141 (2019)","journal-title":"Symmetry"},{"key":"30_CR24","doi-asserted-by":"crossref","unstructured":"Zhou, C., Ma, X., Wang, D., Neubig, G.: Density matching for bilingual word embedding. arXiv preprint \narXiv:1904.02343\n\n (2019)","DOI":"10.18653\/v1\/N19-1161"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61638-0_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T23:28:17Z","timestamp":1602631697000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-61638-0_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030616373","9783030616380"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61638-0_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/di.uniroma1.it\/ACNS2020","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"214","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.7","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic the conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}