{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:17:47Z","timestamp":1742977067692,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819932993"},{"type":"electronic","value":"9789819933006"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-3300-6_26","type":"book-chapter","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:04:01Z","timestamp":1685459041000},"page":"355-367","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Study on Random Generation of Virtual Avatars Based on Big Data"],"prefix":"10.1007","author":[{"given":"Jian","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Mo","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Bo-Lin","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Ling-Ling","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,31]]},"reference":[{"key":"26_CR1","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. Adv. Neural Inform. Process. Syst. 27 (2014)"},{"key":"26_CR2","unstructured":"Mirza, M., Osindero, S.: Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784 (2014)"},{"key":"26_CR3","unstructured":"Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 (2015)"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, H., et al.: Stackgan: Text to photo-realistic image synthesis with stacked generative adversarial networks. In: Proceedings of the IEEE international conference on computer vision, pp. 5907\u20135915 (2017)","DOI":"10.1109\/ICCV.2017.629"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Isola, P., Zhu, J. Y., Zhou, T., Efros, A.A.: Image-to-image translation with conditional adversarial networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 1125\u20131134 (2017)","DOI":"10.1109\/CVPR.2017.632"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Zhu, J.Y., Park, T., Isola, P., Efros, A.A.: Unpaired image-to-image translation using cycle-consistent adversarial networks. In: Proceedings of the IEEE international conference on computer vision, pp. 2223\u20132232 (2017)","DOI":"10.1109\/ICCV.2017.244"},{"key":"26_CR7","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/978-3-030-54407-2_37","volume-title":"Smart Multimedia: Second International Conference, ICSM 2019, San Diego, CA, USA, December 16\u201318, 2019, Revised Selected Papers","author":"K Mahalingaiah","year":"2020","unstructured":"Mahalingaiah, K., Matichuk, B.: ProDeblurGAN: progressive growing of GANs for blind motion deblurring in face recognition. In: McDaniel, T., Berretti, S., Curcio, I.D.D., Basu, A. (eds.) Smart Multimedia: Second International Conference, ICSM 2019, San Diego, CA, USA, December 16\u201318, 2019, Revised Selected Papers, pp. 439\u2013450. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-54407-2_37"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aittala, M., Hellsten, J., Lehtinen, J., Aila, T.: Analyzing and improving the image quality of stylegan. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 8110\u20138119 (2020)","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Zhou, W., Anastasio, M.A.: Markov-chain monte carlo approximation of the ideal observer using generative adversarial networks. In: Medical Imaging 2020: Image Perception, Observer Performance, and Technology Assessment, vol. 11316, p. 113160D. International Society for Optics and Photonics (2020)","DOI":"10.1117\/12.2549732"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Xian, Y., Sharma, S., Schiele, B., Akata, Z.: f-vaegan-d2: A feature generating framework for any-shot learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10275\u201310284 (2019)","DOI":"10.1109\/CVPR.2019.01052"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Khan, M., Chakraborty, S., Astya, R., Khepra, S.: Face detection and recognition using openCV. In: 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), pp. 116\u2013119. IEEE (2019)","DOI":"10.1109\/ICCCIS48478.2019.8974493"},{"key":"26_CR12","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-1-4419-7719-9_10","volume-title":"Handbook of open source tools","author":"S Koranne","year":"2011","unstructured":"Koranne, S.: Hierarchical data format 5: HDF5. In: Koranne, S. (ed.) Handbook of open source tools, pp. 191\u2013200. Springer US, Boston, MA (2011). https:\/\/doi.org\/10.1007\/978-1-4419-7719-9_10"},{"key":"26_CR13","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.patcog.2017.06.018","volume":"75","author":"D Zhai","year":"2018","unstructured":"Zhai, D., Liu, X., Chang, H., Zhen, Y., Chen, X., Guo, M., Gao, W.: Parametric local ultiview hamming distance metric learning. Pattern Recognition 75, 250\u2013262 (2018)","journal-title":"Pattern Recognition"},{"issue":"8","key":"26_CR14","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1109\/LGRS.2013.2295115","volume":"11","author":"B Li","year":"2014","unstructured":"Li, B., Ming, D., Yan, W., Sun, X., Tian, T., Tian, J.: Image matching based on two-column histogram hashing and improved RANSAC. IEEE Geosci. Remote Sens. Lett. 11(8), 1433\u20131437 (2014)","journal-title":"IEEE Geosci. Remote Sens. Lett."},{"key":"26_CR15","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1007\/978-981-13-6772-4_76","volume-title":"Applications of Computing, Automation and Wireless Systems in Electrical Engineering: Proceedings of MARC 2018","author":"AK Dubey","year":"2019","unstructured":"Dubey, A.K., Jain, V.: Comparative study of convolution neural network\u2019s relu and leaky-relu activation functions. In: Mishra, S., Sood, Y.R., Tomar, A. (eds.) Applications of Computing, Automation and Wireless Systems in Electrical Engineering: Proceedings of MARC 2018, pp. 873\u2013880. Springer Singapore, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-6772-4_76"},{"issue":"1","key":"26_CR16","first-page":"012010","volume":"1471","author":"H Pratiwi","year":"2020","unstructured":"Pratiwi, H., et al.: Sigmoid activation function in selecting the best model of artificial neural networks. J. Phys.: Conf. Ser. 1471(1), 012010 (2020)","journal-title":"J. Phys.: Conf. Ser."},{"key":"26_CR17","unstructured":"Ruder, S.: An overview of gradient descent optimization algorithms. arXiv preprint arXiv:1609.04747 (2016)"},{"key":"26_CR18","unstructured":"Kurbiel, T., Khaleghian, S.: Training of deep neural networks based on distance measures using RMSProp. arXiv preprint arXiv:1708.01911 (2017)"},{"key":"26_CR19","unstructured":"Kingma, D.P., Ba, J.: Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-3300-6_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:09:09Z","timestamp":1685459349000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-3300-6_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819932993","9789819933006"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-3300-6_26","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}