{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T00:59:17Z","timestamp":1773881957802,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031065545","type":"print"},{"value":"9783031065552","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-06555-2_22","type":"book-chapter","created":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T09:10:13Z","timestamp":1652778613000},"page":"323-337","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Revealing Reliable Signatures by\u00a0Learning Top-Rank Pairs"],"prefix":"10.1007","author":[{"given":"Xiaotong","family":"Ji","sequence":"first","affiliation":[]},{"given":"Yan","family":"Zheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8901-9063","authenticated-orcid":false,"given":"Daiki","family":"Suehiro","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8592-7566","authenticated-orcid":false,"given":"Seiichi","family":"Uchida","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,18]]},"reference":[{"key":"22_CR1","unstructured":"Dey, S., Dutta, A., Toledo, J.I., Ghosh, S.K., Llad\u00f3s, J., Pal, U.: Signet: convolutional siamese network for writer independent offline signature verification, CoRR (2017). http:\/\/arxiv.org\/abs\/1707.02131"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Zheng, Y., Ohyama, W., Suehiro, D., Uchida, S.: Ranksvm for offline signature verification. In: Proceedings of the ICDAR, pp. 928\u2013933 (2019)","DOI":"10.1109\/ICDAR.2019.00153"},{"key":"22_CR3","unstructured":"Li, N., Jin, R., Zhou. Z.: Top rank optimization in linear time. In: Proceedings of the NIPS, pp. 1502\u20131510 (2014)"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-319-71249-9_2","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"J Frery","year":"2017","unstructured":"Frery, J., Habrard, A., Sebban, M., Caelen, O., He-Guelton, L.: Efficient top rank optimization with gradient boosting for supervised anomaly detection. In: Ceci, M., Hollm\u00e9n, J., Todorovski, L., Vens, C., D\u017eeroski, S. (eds.) ECML PKDD 2017. LNCS (LNAI), vol. 10534, pp. 20\u201335. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-71249-9_2"},{"key":"22_CR5","unstructured":"Boyd, S.P., Cortes, C., Mohri, M., Radovanovic, A.: Accuracy at the top. In: Proceedings of the NIPS, pp. 962\u2013970 (2012)"},{"key":"22_CR6","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1109\/TSMCC.2008.923866","volume":"38","author":"D Impedovo","year":"2008","unstructured":"Impedovo, D., Pirlo, G.: Automatic signature verification: the state of the art. IEEE Trans. Syst. Man Cybern. Part C 38, 609\u2013635 (2008)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Hafemann, L.G., Sabourin, R., Oliveira, L.S.: Offline handwritten signature verification - literature review. In: Proceedings of the IPTA, pp. 1\u20138 (2017)","DOI":"10.1109\/IPTA.2017.8310112"},{"key":"22_CR8","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/34.506415","volume":"18","author":"LL Lee","year":"1996","unstructured":"Lee, L.L., Berger, T., Aviczer, E.: Reliable online human signature verification systems. IEEE Trans. Pattern Anal. Mach. Intell. 18, 643\u2013647 (1996)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"22_CR9","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1142\/S0218001404003630","volume":"18","author":"MK Kalera","year":"2004","unstructured":"Kalera, M.K., Srihari, S.N., Xu, A.: Offline signature verification and identification using distance statistics. Int. J. Pattern Recognit. Artif. Intell. 18, 1339\u20131360 (2004)","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"key":"22_CR10","doi-asserted-by":"publisher","first-page":"966","DOI":"10.1109\/TIFS.2012.2190281","volume":"7","author":"MA Ferrer","year":"2012","unstructured":"Ferrer, M.A., Vargas-Bonilla, J.F., Morales, A., Ordonez, A.: Robustness of offline signature verification based on gray level features. IEEE Trans. Inf. Forensics Secur. 7, 966\u2013977 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"22_CR11","doi-asserted-by":"publisher","first-page":"1624","DOI":"10.1109\/TIFS.2018.2883152","volume":"14","author":"S Lai","year":"2019","unstructured":"Lai, S., Jin, L.: Recurrent adaptation networks for online signature verification. IEEE Trans. Inf. Forensics Secur. 14, 1624\u20131637 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"81010","DOI":"10.1109\/ACCESS.2019.2923093","volume":"7","author":"M Okawa","year":"2019","unstructured":"Okawa, M.: Template matching using time-series averaging and DTW with dependent warping for online signature verification. IEEE Access 7, 81010\u201381019 (2019)","journal-title":"IEEE Access"},{"key":"22_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115756","volume":"186","author":"D Banerjee","year":"2021","unstructured":"Banerjee, D., Chatterjee, B., Bhowal, P., Bhattacharyya, T., Malakar, S., Sarkar, R.: A new wrapper feature selection method for language-invariant offline signature verification. Expert Syst. Appl. 186, 115756 (2021)","journal-title":"Expert Syst. Appl."},{"key":"22_CR14","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.patrec.2018.05.019","volume":"113","author":"M Okawa","year":"2018","unstructured":"Okawa, M.: From bovw to VLAD with KAZE features: offline signature verification considering cognitive processes of forensic experts. Pattern Recognit. Lett. 113, 75\u201382 (2018)","journal-title":"Pattern Recognit. Lett."},{"key":"22_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-540-85920-8_3","volume-title":"Progress in Pattern Recognition, Image Analysis and Applications","author":"J Ruiz-del-Solar","year":"2008","unstructured":"Ruiz-del-Solar, J., Devia, C., Loncomilla, P., Concha, F.: Offline signature verification using local interest points and descriptors. In: Ruiz-Shulcloper, J., Kropatsch, W.G. (eds.) CIARP 2008. LNCS, vol. 5197, pp. 22\u201329. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85920-8_3"},{"key":"22_CR16","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.patcog.2017.05.012","volume":"70","author":"LG Hafemann","year":"2017","unstructured":"Hafemann, L.G., Sabourin, R., Oliveira, L.S.: Learning features for offline handwritten signature verification using deep convolutional neural networks. Pattern Recognit. 70, 163\u2013176 (2017)","journal-title":"Pattern Recognit."},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Souza, V.L.F., Oliveira, A.L.I., Sabourin, R.: A writer-independent approach for offline signature verification using deep convolutional neural networks features. In: Proceedings of the BRACIS, pp. 212\u2013217 (2018)","DOI":"10.1109\/BRACIS.2018.00044"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Melekhov, I., Kannala, J., Rahtu, E .: Siamese network features for image matching. In: Proceedings of the ICPR, pp. 378\u2013383 (2016)","DOI":"10.1109\/ICPR.2016.7899663"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Guo, Q., Feng, W., Zhou, C., Huang, R., Wan, L., Wang, S.: Learning dynamic siamese network for visual object tracking. In: Proceedings of the ICCV, pp. 1781\u20131789 (2017)","DOI":"10.1109\/ICCV.2017.196"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Wei, P., Li, H., Hu, P.: Inverse discriminative networks for handwritten signature verification. In: Proceedings of the CVPR, pp. 5764\u20135772 (2019)","DOI":"10.1109\/CVPR.2019.00591"},{"key":"22_CR21","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s10791-005-6991-7","volume":"8","author":"A Trotman","year":"2005","unstructured":"Trotman, A.: Learning to rank. Inf. Retr. 8, 359\u2013381 (2005)","journal-title":"Inf. Retr."},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Burges, C.J.C., et al.: Learning to rank using gradient descent. In: Proceedings of the ICML, vol. 119, pp. 89\u201396 (2005)","DOI":"10.1145\/1102351.1102363"},{"key":"22_CR23","first-page":"393","volume":"6","author":"S Agarwal","year":"2005","unstructured":"Agarwal, S., Graepel, T., Herbrich, R., Har-Peled, S., Roth, D.: Generalization bounds for the area under the ROC curve. J. Mach. Learn. Res. 6, 393\u2013425 (2005)","journal-title":"J. Mach. Learn. Res."},{"key":"22_CR24","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-23808-6_29","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"N Usunier","year":"2011","unstructured":"Usunier, N., Amini, M.-R., Goutte, C.: Multiview semi-supervised learning for ranking multilingual documents. In: Gunopulos, D., Hofmann, T., Malerba, D., Vazirgiannis, M. (eds.) ECML PKDD 2011. LNCS (LNAI), vol. 6913, pp. 443\u2013458. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23808-6_29"},{"key":"22_CR25","doi-asserted-by":"crossref","unstructured":"Charoenphakdee, N., Lee, J., Jin, Y., Wanvarie, D., Sugiyama, M.: Learning only from relevant keywords and unlabeled documents. In: Proceedings of the EMNLP-IJCNLP, pp. 3991\u20134000 (2019)","DOI":"10.18653\/v1\/D19-1411"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Mehta, S., Pimplikar, R., Singh, A., Varshney, L. R., Visweswariah, K.: Efficient multifaceted screening of job applicants. In: Proceedings of the EDBT\/ICDT, pp. 661\u2013671 (2013)","DOI":"10.1145\/2452376.2452453"},{"key":"22_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108138","volume":"120","author":"Y Zheng","year":"2021","unstructured":"Zheng, Y., Zheng, Y., Suehiro, D., Uchida, S.: Top-rank convolutional neural network and its application to medical image-based diagnosis. Pattern Recognit. 120, 108138 (2021)","journal-title":"Pattern Recognit."},{"key":"22_CR28","unstructured":"Chhabra O., Chakraborty, S.: Siamese triple ranking convolution network in signature forgery detection (2019)"},{"key":"22_CR29","first-page":"2233","volume":"10","author":"C Rudin","year":"2009","unstructured":"Rudin, C.: The p-norm push: a simple convex ranking algorithm that concentrates at the top of the list. J. Mach. Learn. Res. 10, 2233\u20132271 (2009)","journal-title":"J. Mach. Learn. Res."}],"container-title":["Lecture Notes in Computer Science","Document Analysis Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-06555-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:06:12Z","timestamp":1710259572000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-06555-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031065545","9783031065552"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-06555-2_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"18 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Document Analysis Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"La Rochelle","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"das2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/das2022.univ-lr.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"94","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.85","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}