{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:29:06Z","timestamp":1742970546584,"version":"3.40.3"},"publisher-location":"Cham","reference-count":59,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031554858"},{"type":"electronic","value":"9783031554865"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-55486-5_15","type":"book-chapter","created":{"date-parts":[[2024,3,6]],"date-time":"2024-03-06T07:02:33Z","timestamp":1709708553000},"page":"199-214","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Intensity-Chromaticity-Luminance (ICL) Based Technique for Face Spoofing Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-6822-4281","authenticated-orcid":false,"given":"S.","family":"Karthika","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5377-4451","authenticated-orcid":false,"given":"G.","family":"Padmavathi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,7]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Sudeep, S.V.N.V.S., Venkata Kiran, S., Nandan, D., Kumar, S.: An overview of biometrics and face spoofing detection. In: Kumar, A. and Mozar, S., Eds., ICCCE 2020, Springer, Singapore, pp. 871\u2013881 (2021). https:\/\/doi.org\/10.1007\/978-981-15-7961-5_82","key":"15_CR1","DOI":"10.1007\/978-981-15-7961-5_82"},{"issue":"1","key":"15_CR2","first-page":"37","volume":"50","author":"R Ramachandra","year":"2017","unstructured":"Ramachandra, R., Busch, C., Biometric, N.: Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Comput. Surv. 50(1), 37 (2017)","journal-title":"ACM Comput. Surv."},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"1527","DOI":"10.1007\/s00530-023-01070-5","volume":"29","author":"D Sharma","year":"2023","unstructured":"Sharma, D., Selwal, A.: A survey on face presentation attack detection mechanisms: hitherto and future perspectives. Multimedia Syst. 29, 1527\u20131577 (2023). https:\/\/doi.org\/10.1007\/s00530-023-01070-5","journal-title":"Multimedia Syst."},{"doi-asserted-by":"crossref","unstructured":"Jain, A.K., Flynn, P., Ross, A.A.: Handbook of biometrics. Springer Science & Business Media. (2007)","key":"15_CR4","DOI":"10.1007\/978-0-387-71041-9"},{"unstructured":"Yang, J., Lei, Z., Li, S.Z.: Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601 (2014)","key":"15_CR5"},{"doi-asserted-by":"crossref","unstructured":"Maatta, J., Hadid, A., Pietikainen, M.: Face spoofing detection from single images using micro-texture analysis. In: Proceedings of IAPR IEEE International Joint Conference on Biometrics (IJCB), Washington DC, USA (2011)","key":"15_CR6","DOI":"10.1109\/IJCB.2011.6117510"},{"doi-asserted-by":"publisher","unstructured":"Erdogmus, N., Marce, S.: Spoofing face recognition with 3D masks. no. July, (2014).\u00a0https:\/\/doi.org\/10.1109\/TIFS.2014.2322255","key":"15_CR7","DOI":"10.1109\/TIFS.2014.2322255"},{"key":"15_CR8","doi-asserted-by":"publisher","first-page":"8883","DOI":"10.1007\/s11042-017-4780-0","volume":"77","author":"F Peng","year":"2018","unstructured":"Peng, F., Qin, L., Long, M.: Face presentation attack detection using guided scale texture. Multimed Tools Appl 77, 8883\u20138909 (2018). https:\/\/doi.org\/10.1007\/s11042-017-4780-0","journal-title":"Multimed Tools Appl"},{"unstructured":"Waris, M., Zhang, H., Ahmad, I., Kiranyaz, S., Gabbouj, M.: Analysis of textural features for face biometric anti-spoofing,\u201d no. February 2018, (2013)","key":"15_CR9"},{"issue":"3","key":"15_CR10","first-page":"285","volume":"3","author":"Z Yu","year":"2021","unstructured":"Yu, Z., Li, X., Shi, J., Xia, Z., Zhao, G.: Revisiting pixel-wise supervision for face anti-spoofing. IEEE TBBIS 3(3), 285\u2013295 (2021)","journal-title":"IEEE TBBIS"},{"doi-asserted-by":"crossref","unstructured":"Peng, F., Qin, L., Long, M.: CCoLBP\u202f: chromatic co - occurrence of local binary pattern for face presentation attack detection (2018)","key":"15_CR11","DOI":"10.1109\/ICCCN.2018.8487325"},{"doi-asserted-by":"publisher","unstructured":"Hasan, R., Mahmud, S.M.H., Li, X.Y.: Face anti-spoofing using texture-based techniques and filtering methods. J. Phys. Conf. Ser. (2019). https:\/\/doi.org\/10.1088\/1742-6596\/1229\/1\/012044","key":"15_CR12","DOI":"10.1088\/1742-6596\/1229\/1\/012044"},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"107293","DOI":"10.1016\/j.compeleceng.2021.107293","volume":"94","author":"N Daniel","year":"2021","unstructured":"Daniel, N., Anith, A.: Texture and quality analysis for face spoofing detection. Comput. Electr. Eng. 94, 107293 (2021)","journal-title":"Comput. Electr. Eng."},{"doi-asserted-by":"publisher","unstructured":"Li, L., Xia, Z., Wu, J., Yang, L., Han, H.: Face presentation attack detection based on optical flow and texture analysis. J. King Saud Univ. Comput. Inf. Sci.\u00a034(4), 1455\u20131467 (2022).\u00a0https:\/\/doi.org\/10.1016\/j.jksuci.2022.02.019","key":"15_CR14","DOI":"10.1016\/j.jksuci.2022.02.019"},{"doi-asserted-by":"crossref","unstructured":"Teja, M.H.: Real-time live face detection using face template matching and DCT energy analysis. In:\u00a0International Conference of Soft Computing and Pattern Recognition (SoCPaR), Dalian, China (2011)","key":"15_CR15","DOI":"10.1109\/SoCPaR.2011.6089267"},{"doi-asserted-by":"crossref","unstructured":"Peng, J., Chan, P. P. K.: Face liveness detection for combating the spoofing attack in face recognition, pp 13\u201316 (2014)","key":"15_CR16","DOI":"10.1109\/ICWAPR.2014.6961311"},{"key":"15_CR17","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/TIP.2013.2292332","volume":"23","author":"J Galbally","year":"2013","unstructured":"Galbally, J., Marcel, S., Fierrez, J.: Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. Image Process IEEE Trans. Biometrics Compendium 23, 710\u2013724 (2013)","journal-title":"Image Process IEEE Trans. Biometrics Compendium"},{"doi-asserted-by":"crossref","unstructured":"Bhogal,\u00a0A.P.S., S\u00f6llinger, D., Trung, P., Uhl, A.:\u00a0Non-reference image quality assessment for biometric presentation attack detection. In: 5th International Workshop on Biometrics and Forensics (IWBF), Coventry, United Kingdom (2017)","key":"15_CR18","DOI":"10.1109\/IWBF.2017.7935080"},{"unstructured":"Nikisins, O., Mohammadi, A.: On effectiveness of anomaly detection approaches against unseen presentation attacks in face anti-spoofing (1920)","key":"15_CR19"},{"unstructured":"Wen, D., Han, H., Jain, A.K.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forens. Secur.\u00a0XX(X), 1\u201316 (2015)","key":"15_CR20"},{"key":"15_CR21","doi-asserted-by":"publisher","first-page":"175429","DOI":"10.1109\/ACCESS.2019.2957273","volume":"7","author":"HP Nguyen","year":"2019","unstructured":"Nguyen, H.P., Delahaies, A.: Face presentation attack detection based on a statistical model of image noise. IEEE Access 7, 175429\u2013175442 (2019)","journal-title":"IEEE Access"},{"key":"15_CR22","doi-asserted-by":"publisher","first-page":"2461","DOI":"10.1007\/s00371-021-02123-4","volume":"38","author":"S Arora","year":"2022","unstructured":"Arora, S., Bhatia, M.P.S., Mittal, V.: A robust framework for spoofing detection in faces using deep learning. Vis. Comput. 38, 2461\u20132472 (2022). https:\/\/doi.org\/10.1007\/s00371-021-02123-4","journal-title":"Vis. Comput."},{"key":"15_CR23","doi-asserted-by":"publisher","first-page":"109148","DOI":"10.1016\/j.patcog.2022.109148","volume":"135","author":"M Pei","year":"2023","unstructured":"Pei, M., Yan, B., Hao, H., Zhao, M.: Person-specific face spoofing detection based on a siamese network. Pattern Recognit. 135, 109148 (2023). https:\/\/doi.org\/10.1016\/j.patcog.2022.109148","journal-title":"Pattern Recognit."},{"doi-asserted-by":"publisher","unstructured":"Li, X., Komulainen, J., Zhao, G., Yuen, P., Pietik, M.: Generalized face anti-spoofing by detecting pulse from face videos. In: International Conference Pattern Recognition, December, pp. 4244\u20134249. (2016).\u00a0https:\/\/doi.org\/10.1109\/ICPR.2016.7900300","key":"15_CR24","DOI":"10.1109\/ICPR.2016.7900300"},{"doi-asserted-by":"publisher","unstructured":"Zheng, W., Yue, M., Zhao, S., Liu S.: Attention-based spatial-temporal multi-scale network for face anti-spoofing.\u00a0IEEE Trans. Biom. Behav. Identity Sci 3, 296\u2013307 (2021). https:\/\/doi.org\/10.1109\/TBIOM.2021.3066983","key":"15_CR25","DOI":"10.1109\/TBIOM.2021.3066983"},{"doi-asserted-by":"crossref","unstructured":"Yang, X., et al.: Face anti-spoofing: model matters, so does data. In:\u00a0Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3507\u20133516 (2019)","key":"15_CR26","DOI":"10.1109\/CVPR.2019.00362"},{"key":"15_CR27","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.eswa.2018.05.004","volume":"108","author":"Y Abbas","year":"2018","unstructured":"Abbas, Y., Rehman, U., Po, L.M., Liu, M.: LiveNet: improving features generalization for face liveness detection using convolution neural networks. Expert Syst. Appl. 108, 159\u2013169 (2018). https:\/\/doi.org\/10.1016\/j.eswa.2018.05.004","journal-title":"Expert Syst. Appl."},{"key":"15_CR28","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.neucom.2020.05.017","volume":"409","author":"L Li","year":"2020","unstructured":"Li, L., Xia, Z., Jiang, X., Roli, F., Feng, X.: CompactNet: learning a compact space for face presentation attack detection. Neurocomputing 409, 191\u2013207 (2020). https:\/\/doi.org\/10.1016\/j.neucom.2020.05.017","journal-title":"Neurocomputing"},{"doi-asserted-by":"crossref","unstructured":"Wang, C.Y., Lu, Y.D., Yang, S.T., Lai, S.H.: Patchnet: a simple face anti spoofing framework via fine-grained patch recognition. In: CVPR, pp. 20249\u2013. 20258 (2022)","key":"15_CR29","DOI":"10.1109\/CVPR52688.2022.01964"},{"key":"15_CR30","doi-asserted-by":"publisher","first-page":"1880","DOI":"10.1049\/iet-ipr.2018.5560","volume":"13","author":"M Khammari","year":"2019","unstructured":"Khammari, M.: Robust face anti-spoofing using CNN with LBP and WLD. IET Image Process. 13, 1880\u20131884 (2019)","journal-title":"IET Image Process."},{"doi-asserted-by":"crossref","unstructured":"Zhou, J., Shu, K., Liu, P., Xiang, J., Xiong, S.: Face anti-spoofing based on dynamic color texture analysis using local directional number pattern. In: 25th International Conference on Pattern Recognition (ICPR), Milan, Italy (2021)","key":"15_CR31","DOI":"10.1109\/ICPR48806.2021.9412323"},{"doi-asserted-by":"publisher","unstructured":"Boulkenafet, Z., Komulainen. J., Hadid, A.: Face anti-spoofing based on color texture analysis. In: Proceedings - International Conference on Image Processing, ICIP, pp. 2636\u20132640 (2015). https:\/\/doi.org\/10.1109\/ICIP.2015.7351280","key":"15_CR32","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"15_CR33","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.jvcir.2018.01.001","volume":"51","author":"LB Zhang","year":"2018","unstructured":"Zhang, L.B., Peng, F., Qin, L., Long, M.: Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination. J. Vis. Commun. Image Represent. 51, 56\u201369 (2018). https:\/\/doi.org\/10.1016\/j.jvcir.2018.01.001","journal-title":"J. Vis. Commun. Image Represent."},{"doi-asserted-by":"crossref","unstructured":"Larbi, K., Ouarda, W., Drira, H., Amor, B.B., Amar, C.B.:\u00a0Deep colorfasd: Face anti spoofing solution using a multi channeled color spaces CNN. In: IEEE International Conference on Systems, Man, and Cybernetics (SMC), Miyazaki, Japan (2018)","key":"15_CR34","DOI":"10.1109\/SMC.2018.00680"},{"doi-asserted-by":"crossref","unstructured":"Li, L., Feng, X.: Face anti-spoofing via deep local binary pattern. In: Deep Learning in Object Detection and Recognition, Singapore, pp. 91\u2013111 (2019)","key":"15_CR35","DOI":"10.1007\/978-981-10-5152-4_4"},{"doi-asserted-by":"publisher","unstructured":"Hani, K.A., Mohamad-Saleh, J., Azmin Suandi, S.: Color space selection for human skin detection using color-texture features and neural network. In: International Conference on Computer and Information Sciences (ICCOINS), Kuala Lumpur, Malaysia (2014). https:\/\/doi.org\/10.1109\/ICCOINS33058.2014","key":"15_CR36","DOI":"10.1109\/ICCOINS33058.2014"},{"doi-asserted-by":"crossref","unstructured":"Sawicki, D.J.,\u00a0Miziolek, W.: Human colour skin detection in CMYK colour space. IET-IPR(9), 751\u2013757, (2015)","key":"15_CR37","DOI":"10.1049\/iet-ipr.2014.0859"},{"doi-asserted-by":"publisher","unstructured":"Pramestya, R.H., Sulistyaningrum, D.R., Setiyono, B., Mukhlash, I., Firdaus, Z.: Road defect classification using gray level co-occurrence matrix (GLCM) and radial basis function (RBF). In:\u00a02018 10th International Conference on Information Technology and Electrical Engineering (ICITEE), pp.\u00a0285\u2013289 (2018).\u00a0https:\/\/doi.org\/10.1109\/ICITEED.2018.8534769","key":"15_CR38","DOI":"10.1109\/ICITEED.2018.8534769"},{"key":"15_CR39","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1109\/TSMC.1973.4309314","volume":"3","author":"RM Haralick","year":"1973","unstructured":"Haralick, R.M., Shanmugam, K., Dinstein, I.H.: Textural features for image classification Systems. Man Cybern. IEEE Trans. 3, 610\u2013621 (1973)","journal-title":"Man Cybern. IEEE Trans."},{"key":"15_CR40","doi-asserted-by":"publisher","first-page":"786","DOI":"10.1109\/PROC.1979.11328","volume":"67","author":"RM Haralick","year":"1979","unstructured":"Haralick, R.M.: Statistical and structural approaches to texture. Proc. of the IEEE 67, 786\u2013804 (1979)","journal-title":"Proc. of the IEEE"},{"unstructured":"Hall-Beyer M.: GLCM texture: a tutorial v. 3.0.\u00a0(2017) https:\/\/prism.ucalgary.ca\/handle\/1880\/51900","key":"15_CR41"},{"doi-asserted-by":"crossref","unstructured":"Gade, A.A.,\u00a0Vyavahare, A.J: Feature extraction using GLCM\u00a0for\u00a0dietary assessment application. Int. J. Multimedia Image Process. 8(2), 409\u2013413 (2018)","key":"15_CR42","DOI":"10.20533\/ijmip.2042.4647.2018.0050"},{"doi-asserted-by":"crossref","unstructured":"Cernadas, E., Fern\u00e1ndez-Delgado, M., Gonz\u00e1lez-Rufino, E., Carri\u00f3n, P: Influence of normalization and color space to color texture classification. Pattern Recogn. 61, 120\u2013138 (2017)","key":"15_CR43","DOI":"10.1016\/j.patcog.2016.07.002"},{"doi-asserted-by":"crossref","unstructured":"Zhou, Y.: Building regionally spatial appearance model by topological color histogram. In: 14th IEEE International Conference on Computational Science and Engineering (2011)","key":"15_CR44","DOI":"10.1109\/CSE.2011.23"},{"doi-asserted-by":"publisher","unstructured":"Tan, X., Li, Y., Liu, J., Jiang, L.: Face liveness detection from a single image with sparse low rank bilinear discriminative model. In: Daniilidis, K., Maragos, P., Paragios, N. (eds.) Computer Vision \u2013 ECCV 2010. ECCV 2010. LNCS, vol. 6316, pp. 504\u2013517. Springer, Berlin )2010_. https:\/\/doi.org\/10.1007\/978-3-642-15567-3_37","key":"15_CR45","DOI":"10.1007\/978-3-642-15567-3_37"},{"doi-asserted-by":"crossref","unstructured":"Kumar, S., Singh, S., Kumar, J.: Face spoofing detection using improved SegNet architecture with a blur estimation technique. Int. J. Biomet. 13(2), 131\u2013149 (2021)","key":"15_CR46","DOI":"10.1504\/IJBM.2021.114639"},{"issue":"3","key":"15_CR47","first-page":"159","volume":"20","author":"RJ Raghavendra","year":"2020","unstructured":"Raghavendra, R.J., Kunte, R.S.: A novel feature descriptor for face anti-spoofing using texture based method. Cybern. Inf. Technol. 20(3), 159\u2013176 (2020)","journal-title":"Cybern. Inf. Technol."},{"doi-asserted-by":"crossref","unstructured":"Anand, A., Vishwakarma, D.K.: Face anti-spoofing by spatial fusion of color texture features and deep features. In: 3rd International Conference on Intelligent Sustainable Systems (ICISS\u201920), pp. 1012\u20131017. IEEE, Coimbatore, India (2020)","key":"15_CR48","DOI":"10.1109\/ICISS49785.2020.9316017"},{"issue":"12","key":"15_CR49","first-page":"1397","volume":"64","author":"D Souza","year":"2017","unstructured":"Souza, D., Da Silva Santos, D.F., Pires, R.G., Marana, A.N., Papa, J.P.: Deep texture features for robust face spoofing detection. IEEE Trans. Circuits Syst. II Express Briefs 64(12), 1397\u20131401 (2017)","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"doi-asserted-by":"crossref","unstructured":"Yang, J., Lei, Z., Liao, S., Li, S.Z.: Face liveness detection with component dependent descriptor. In: 2013 International Conference on Biometrics (ICB), IEEE (2013)","key":"15_CR50","DOI":"10.1109\/ICB.2013.6612955"},{"doi-asserted-by":"publisher","unstructured":"Tan, X., Li, Y., Liu, J., Jiang, L.: Face liveness detection from a single image with sparse low rank bilinear discriminative model. In: Daniilidis, K., Maragos, P., Paragios, N. (eds.) Computer Vision \u2013 ECCV 2010. ECCV 2010. LNCS, vol. 6316, pp. 507\u2013517. Springer, Berlin (2010). https:\/\/doi.org\/10.1007\/978-3-642-15567-3_37","key":"15_CR51","DOI":"10.1007\/978-3-642-15567-3_37"},{"doi-asserted-by":"publisher","unstructured":"Linn, P.P.P., Htoon, E.C.: Face anti-spoofing using eyes movement and CNN-based liveness detection. In: International Conference on Advanced Information Technologies (ICAIT), pp. 149\u2013154. IEEE, Yangon, Myanmar (2019). https:\/\/doi.org\/10.1109\/AITC.2019.8921091","key":"15_CR52","DOI":"10.1109\/AITC.2019.8921091"},{"issue":"11","key":"15_CR53","first-page":"644","volume":"7","author":"G Thippeswamy","year":"2020","unstructured":"Thippeswamy, G., Vinutha, H., Dhanapal, R.: A new ensemble of texture descriptors based on local appearance-based methods for face anti-spoofing system. Crit. Rev. 7(11), 644\u2013649 (2020)","journal-title":"Crit. Rev."},{"issue":"12","key":"15_CR54","doi-asserted-by":"publisher","first-page":"139","DOI":"10.3390\/jimaging6120139","volume":"6","author":"Z Ming","year":"2020","unstructured":"Ming, Z., Visani, M., Luqman, M., Burie, J.C.: A survey on anti-spoofing methods for face recognition with RGB cameras of generic consumer devices. J. Imaging 6(12), 139 (2020)","journal-title":"J. Imaging"},{"doi-asserted-by":"publisher","unstructured":"Chen, F., Wen, C., Xie, K., Wen, F., Sheng, G., Tang, X.: Face liveness detection: fusing colour texture feature and deep feature. IET Biometr. (2019).\u00a0https:\/\/doi.org\/10.1049\/iet-bmt.2018.5235","key":"15_CR55","DOI":"10.1049\/iet-bmt.2018.5235"},{"key":"15_CR56","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/j.patcog.2018.08.019","volume":"85","author":"X Song","year":"2019","unstructured":"Song, X., Zhao, X., Fang, L., Lin, T.: Discriminative representation combinations for accurate face spoofing detection. Pattern Recogn. 85, 220\u2013231 (2019)","journal-title":"Pattern Recogn."},{"unstructured":"Raghavendra, Kunte, R.S.: Anisotropic smoothing for illumination invariant face anti-spoofing. In: 4th International Conference on Trends in Electronics and Informatics (ICOEI) (48184). IEEE, Tirunelveli, India (2020)","key":"15_CR57"},{"doi-asserted-by":"crossref","unstructured":"Zhuo, W., Zezheng, W., Zitong, Y., Weihong, D., Jiahong, L., Tingting, G., Zhongyuan, W.: Domain generalization via shuffled style assembly for face anti-spoofing. In: Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4113\u20134123. IEEE\/CVF, New Orleans, LA, USA (2022)","key":"15_CR58","DOI":"10.1109\/CVPR52688.2022.00409"},{"key":"15_CR59","first-page":"1254","volume":"17","author":"Z Wang","year":"2022","unstructured":"Wang, Z., Wang, Q., Deng, W., Guo, G.: Learning multi-granularity temporal characteristics for face anti-spoofing. IEEE TIFS 17, 1254\u20131269 (2022)","journal-title":"IEEE TIFS"}],"container-title":["Communications in Computer and Information Science","Applied Machine Learning and Data Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-55486-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T22:01:00Z","timestamp":1731535260000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-55486-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031554858","9783031554865"],"references-count":59,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-55486-5_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"7 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AMLDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Machine Learning and Data Analytics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"L\u00fcbeck","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"amlda2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icamlda.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"76","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}