{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T07:47:48Z","timestamp":1775461668377,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s00521-025-11755-9","type":"journal-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T07:44:37Z","timestamp":1772783077000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dynamically stabilized recurrent neural network optimized with wolf bird optimization for face sketch recognition"],"prefix":"10.1007","volume":"38","author":[{"given":"T. Kalai","family":"Selvi","sequence":"first","affiliation":[]},{"given":"A. Sumaiya","family":"Begum","sequence":"additional","affiliation":[]},{"given":"R.","family":"Meena","sequence":"additional","affiliation":[]},{"given":"K. P.","family":"Revathi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,6]]},"reference":[{"issue":"1","key":"11755_CR1","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/s00500-021-05700-w","volume":"27","author":"MS Sannidhan","year":"2023","unstructured":"Sannidhan MS, Prabhu GA, Chaitra KM, Mohanty JR (2023) Retracted article: performance enhancement of generative adversarial network for photograph\u2013sketch identification. Soft Comput 27(1):435\u2013452","journal-title":"Soft Comput"},{"issue":"1","key":"11755_CR2","doi-asserted-by":"publisher","DOI":"10.1186\/s40494-023-00865-z","volume":"11","author":"M Yan","year":"2023","unstructured":"Yan M, Xiong R, Shen Y, Jin C, Wang Y (2023) Intelligent generation of Peking opera facial masks with deep learning frameworks. Herit Sci 11(1):20","journal-title":"Herit Sci"},{"issue":"6","key":"11755_CR3","first-page":"3229","volume":"15","author":"SB Prasad","year":"2023","unstructured":"Prasad SB, Chandana BS (2023) Mobilenetv3: a deep learning technique for human face expressions identification. Int J Inf Technol 15(6):3229\u20133243","journal-title":"Int J Inf Technol"},{"key":"11755_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2023.104688","volume":"135","author":"F Boutros","year":"2023","unstructured":"Boutros F, Struc V, Fierrez J, Damer N (2023) Synthetic data for face recognition: current state and future prospects. Image Vis Comput 135:104688","journal-title":"Image Vis Comput"},{"key":"11755_CR5","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1016\/j.ins.2022.11.121","volume":"621","author":"S Gao","year":"2023","unstructured":"Gao S, Wu R, Wang X, Liu J, Li Q, Tang X (2023) EFR-CSTP: encryption for face recognition based on the chaos and semi-tensor product theory. Inf Sci 621:766\u2013781","journal-title":"Inf Sci"},{"issue":"2","key":"11755_CR6","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1109\/TBIOM.2023.3242085","volume":"5","author":"Z Wang","year":"2023","unstructured":"Wang Z, Huang B, Wang G, Yi P, Jiang K (2023) Masked face recognition dataset and application. IEEE Trans Biometrics Behav Identity Sci 5(2):298\u2013304","journal-title":"IEEE Trans Biometrics Behav Identity Sci"},{"key":"11755_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2023.100719","volume":"27","author":"G Rajeshkumar","year":"2023","unstructured":"Rajeshkumar G, Braveen M, Venkatesh R, Shermila PJ, Prabu BG, Veerasamy B, Bharathi B, Jeyam A (2023) Smart office automation via faster R-CNN based face recognition and internet of things. Meas Sens 27:100719","journal-title":"Meas Sens"},{"key":"11755_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109065","volume":"134","author":"C Yu","year":"2023","unstructured":"Yu C, Zhang Z, Li H, Sun J, Xu Z (2023) Meta-learning-based adversarial training for deep 3D face recognition on point clouds. Pattern Recognit 134:109065","journal-title":"Pattern Recognit"},{"key":"11755_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106513","volume":"124","author":"F Zhao","year":"2023","unstructured":"Zhao F, Zhang P, Zhang R, Li M (2023) DGFaceNet: lightweight and efficient face recognition. Eng Appl Artif Intell 124:106513","journal-title":"Eng Appl Artif Intell"},{"key":"11755_CR10","doi-asserted-by":"publisher","first-page":"84258","DOI":"10.1109\/ACCESS.2023.3302905","volume":"11","author":"V Rajyalakshmi","year":"2023","unstructured":"Rajyalakshmi V, Lakshmanna K (2023) Intelligent face recognition based multi-location linked IoT based car parking system. IEEE Access 11:84258\u201384269","journal-title":"IEEE Access"},{"issue":"4","key":"11755_CR11","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/s10610-022-09512-y","volume":"29","author":"VL Raposo","year":"2023","unstructured":"Raposo VL (2023) The use of facial recognition technology by law enforcement in Europe: a non-orwellian draft proposal. Eur J Crim Policy Res 29(4):515\u2013533","journal-title":"Eur J Crim Policy Res"},{"issue":"1","key":"11755_CR12","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s43681-022-00146-8","volume":"3","author":"RA Waelen","year":"2023","unstructured":"Waelen RA (2023) The struggle for recognition in the age of facial recognition technology. AI Ethics 3(1):215\u2013222","journal-title":"AI Ethics"},{"issue":"4","key":"11755_CR13","doi-asserted-by":"publisher","first-page":"1929","DOI":"10.1007\/s00146-023-01648-7","volume":"39","author":"Y Wen","year":"2024","unstructured":"Wen Y, Holweg M (2024) A phenomenological perspective on AI ethical failures: the case of facial recognition technology. AI Soc 39(4):1929\u20131946","journal-title":"AI Soc"},{"key":"11755_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109552","volume":"140","author":"J Yang","year":"2023","unstructured":"Yang J, Wang Z, Huang B, Xiao J, Liang C, Han Z, Zou H (2023) Headpose-softmax: head pose adaptive curriculum learning loss for deep face recognition. Pattern Recognit 140:109552","journal-title":"Pattern Recognit"},{"issue":"1","key":"11755_CR15","doi-asserted-by":"publisher","first-page":"101761","DOI":"10.1016\/j.giq.2022.101761","volume":"40","author":"G Kostka","year":"2023","unstructured":"Kostka G, Steinacker L, Meckel M (2023) Under big brother\u2019s watchful eye: Cross-country attitudes toward facial recognition technology. Gov Inf Q 40(1):101761","journal-title":"Gov Inf Q"},{"issue":"26","key":"11755_CR16","doi-asserted-by":"publisher","first-page":"19025","DOI":"10.1007\/s00521-023-08732-5","volume":"35","author":"A Khalifa","year":"2023","unstructured":"Khalifa A, Al-Hamadi A (2023) Jamsface: joint adaptive margins loss for deep face recognition. Neural Comput Appl 35(26):19025\u201319037","journal-title":"Neural Comput Appl"},{"key":"11755_CR17","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.neucom.2022.12.016","volume":"522","author":"X Fan","year":"2023","unstructured":"Fan X, Liao M, Xue J, Wu H, Jin L, Zhao J, Zhu L (2023) Joint coupled representation and homogeneous reconstruction for multi-resolution small sample face recognition. Neurocomputing 522:89\u2013104","journal-title":"Neurocomputing"},{"key":"11755_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103058","volume":"125","author":"MA Butt","year":"2023","unstructured":"Butt MA, Qayyum A, Ali H, Al-Fuqaha A, Qadir J (2023) Towards secure private and trustworthy human-centric embedded machine learning: an emotion-aware facial recognition case study. Comput Secur 125:103058","journal-title":"Comput Secur"},{"key":"11755_CR19","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.cortex.2023.05.021","volume":"168","author":"N Zaragoza-Jimenez","year":"2023","unstructured":"Zaragoza-Jimenez N, Niehaus H, Thome I, Vogelbacher C, Ende G, Kamp-Becker I, Endres D, Jansen A (2023) Modeling face recognition in the predictive coding framework: a combined computational modeling and functional imaging study. Cortex 168:203\u2013225","journal-title":"Cortex"},{"key":"11755_CR20","doi-asserted-by":"crossref","unstructured":"Gode CS, Khobragade AS, Thanekar C, Thengadi O, Lakde K (2022) Face recognition-based attendance system. In: Computational vision and bio-inspired computing: proceedings of ICCVBIC. Springer Nature Singapore, Singapore, pp 159\u2013166","DOI":"10.1007\/978-981-19-9819-5_12"},{"key":"11755_CR21","doi-asserted-by":"publisher","first-page":"128539","DOI":"10.1016\/j.eswa.2025.128539","volume":"294","author":"BM Devi","year":"2025","unstructured":"Devi BM, Reddy BB, Chandra IS, Lakshmi NM, Laxmi C (2025) A rotation invariant Co-ordinate convolutional neural network based crime prediction utilizing Jarrett-Butterfly optimization algorithm. Expert Syst Appl 294:128539","journal-title":"Expert Syst Appl"},{"key":"11755_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2025.127124","volume":"276","author":"CL Reddy","year":"2025","unstructured":"Reddy CL, Prasad MV (2025) Automatic lung cancer detection from CT image using optimized robust deformed convolutional neural network with trihorn-net. Expert Syst Appl 276:127124","journal-title":"Expert Syst Appl"},{"key":"11755_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2025.126731","volume":"272","author":"AP Kshirsagar","year":"2025","unstructured":"Kshirsagar AP, Azath H (2025) A comprehensive ATM security framework for detecting abnormal human activity via granger causality-inspired graph neural network optimized with eagle-strategy supply-demand optimization. Expert Syst Appl 272:126731","journal-title":"Expert Syst Appl"},{"key":"11755_CR24","doi-asserted-by":"crossref","unstructured":"Bian H, Lv B, Guo Y, Zhang B, Du K (2025) Sketch face recognition method based on local-global adapter. IEEE Access","DOI":"10.1109\/ACCESS.2025.3553314"},{"key":"11755_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2025.117369","volume":"138","author":"I Pattnaik","year":"2025","unstructured":"Pattnaik I, Dev A, Mohapatra AK (2025) Cask-net fusion: multi branch approach for cross-age sketch face recognition. Signal Process Image Commun 138:117369","journal-title":"Signal Process Image Commun"},{"issue":"8","key":"11755_CR26","doi-asserted-by":"publisher","first-page":"962","DOI":"10.1049\/cvi2.12209","volume":"17","author":"L Cao","year":"2023","unstructured":"Cao L, Yin J, Guo Y, Du K, Zhang F (2023) Sketch face recognition based on light semantic transformer network. IET Comput Vis 17(8):962\u2013976","journal-title":"IET Comput Vis"},{"issue":"5","key":"11755_CR27","doi-asserted-by":"publisher","first-page":"6103","DOI":"10.1007\/s40747-024-01456-6","volume":"10","author":"K Du","year":"2024","unstructured":"Du K, Wang Y, Yin J, Cao L, Guo Y (2024) Residual serialized cross grouping transformer for small scale sketch face recognition. Complex Intell Syst 10(5):6103\u20136116","journal-title":"Complex Intell Syst"},{"key":"11755_CR28","doi-asserted-by":"crossref","unstructured":"Lakshmi N, Arakeri MP (2023) Sketch-based face recognition using deep neural network for criminal investigation. In: Computational vision and bio-inspired computing: proceedings of ICCVBIC 2022 Apr 8. Springer Nature Singapore, Singapore, pp 449\u2013460","DOI":"10.1007\/978-981-19-9819-5_33"},{"key":"11755_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2024.104204","volume":"102","author":"Z Shi","year":"2024","unstructured":"Shi Z, Wan W (2024) Transformer-based adversarial network for semi-supervised face sketch synthesis. J Vis Commun Image Represent 102:104204","journal-title":"J Vis Commun Image Represent"},{"issue":"2","key":"11755_CR30","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1109\/TETCI.2024.3359090","volume":"8","author":"J Zheng","year":"2024","unstructured":"Zheng J, Tang Y, Huang A, Wu D (2024) Hierarchical multivariate representation learning for face sketch recognition. IEEE Trans Emerg Top Comput Intell 8(2):2037\u20132049","journal-title":"IEEE Trans Emerg Top Comput Intell"},{"key":"11755_CR31","doi-asserted-by":"crossref","unstructured":"Lu D, Chen Z, Liu C, Hu Y, Cai L, Wu QJ (2025). Few-Shot Facial Sketch Synthesis via Progressive Domain Gap Reduction. IEEE Transactions on Information Forensics and Security. Jul 7.","DOI":"10.1109\/TIFS.2025.3586501"},{"key":"11755_CR32","unstructured":"https:\/\/www.kaggle.com\/datasets\/alexkei\/facescatches\/data"},{"key":"11755_CR33","doi-asserted-by":"publisher","first-page":"50700","DOI":"10.1109\/ACCESS.2023.3277616","volume":"11","author":"Y Yu","year":"2023","unstructured":"Yu Y, Li Q, Zhang H (2023) Unscented trainable Kalman filter based on deep learning method considering incomplete information. IEEE Access 11:50700\u201350709","journal-title":"IEEE Access"},{"key":"11755_CR34","doi-asserted-by":"publisher","first-page":"108592","DOI":"10.1016\/j.measurement.2020.108592","volume":"173","author":"Z Hua","year":"2021","unstructured":"Hua Z, Shi J, Luo Y, Huang W, Wang J, Zhu Z (2021) Iterative matching synchrosqueezing transform and application to rotating machinery fault diagnosis under nonstationary conditions. Measurement 173:108592","journal-title":"Measurement"},{"issue":"2","key":"11755_CR35","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1007\/s11063-021-10676-7","volume":"54","author":"S Saab Jr","year":"2022","unstructured":"Saab S Jr, Fu Y, Ray A, Hauser M (2022) A dynamically stabilized recurrent neural network. Neural Process Lett 54(2):1195\u20131209","journal-title":"Neural Process Lett"},{"issue":"2","key":"11755_CR36","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.jer.2023.11.024","volume":"13","author":"M Azizi","year":"2025","unstructured":"Azizi M, Shishehgarkhaneh MB, Basiri M, Moehler RC, Fang Y, Chan M (2025) Wolf-Bird optimizer (WBO): a novel metaheuristic algorithm for Building Information Modeling-based resource tradeoff. J Eng Res 13(2):763\u2013785","journal-title":"J Eng Res"},{"key":"11755_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106746","volume":"214","author":"S Min","year":"2021","unstructured":"Min S, Gao Z, Peng J, Wang L, Qin K, Fang B (2021) Stgsn\u2014a spatial\u2013temporal graph neural network framework for time-evolving social networks. Knowl-Based Syst 214:106746","journal-title":"Knowl-Based Syst"},{"issue":"2","key":"11755_CR38","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/s12065-021-00694-8","volume":"16","author":"J Vimala Devi","year":"2023","unstructured":"Vimala Devi J, Kavitha KS (2023) Adaptive deep Q learning network with reinforcement learning for crime prediction. Evol Intell 16(2):685\u2013696","journal-title":"Evol Intell"},{"key":"11755_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcom.2024.100723","volume":"51","author":"N Waddenkery","year":"2024","unstructured":"Waddenkery N, Soma S (2024) An efficient convolutional neural network for detecting the crime of stealing in videos. Entertain Comput 51:100723","journal-title":"Entertain Comput"},{"issue":"11","key":"11755_CR40","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6852","volume":"34","author":"KK Kumar","year":"2022","unstructured":"Kumar KK, Venkateswara Reddy H (2022) Crime activities prediction system in video surveillance by an optimized deep learning framework. Concurrency Computat Pract Exper 34(11):e6852","journal-title":"Concurrency Computat Pract Exper"},{"key":"11755_CR41","doi-asserted-by":"publisher","first-page":"38254","DOI":"10.1109\/ACCESS.2021.3063671","volume":"9","author":"J Liu","year":"2021","unstructured":"Liu J, Yang D, Lian M, Li M (2021) Research on intrusion detection based on particle swarm optimization in IoT. IEEE Access 9:38254\u201338268","journal-title":"IEEE Access"},{"key":"11755_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.commatsci.2020.110067","volume":"186","author":"C Kim","year":"2021","unstructured":"Kim C, Batra R, Chen L, Tran H, Ramprasad R (2021) Polymer design using genetic algorithm and machine learning. Comput Mater Sci 186:110067","journal-title":"Comput Mater Sci"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-025-11755-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-025-11755-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-025-11755-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T06:49:32Z","timestamp":1775458172000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-025-11755-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":42,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["11755"],"URL":"https:\/\/doi.org\/10.1007\/s00521-025-11755-9","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3]]},"assertion":[{"value":"25 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"128"}}