{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:54:32Z","timestamp":1762034072454,"version":"3.37.3"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"40","license":[{"start":{"date-parts":[[2024,3,20]],"date-time":"2024-03-20T00:00:00Z","timestamp":1710892800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,20]],"date-time":"2024-03-20T00:00:00Z","timestamp":1710892800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-18880-y","type":"journal-article","created":{"date-parts":[[2024,3,20]],"date-time":"2024-03-20T07:02:37Z","timestamp":1710918157000},"page":"87749-87780","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["CNN-LPQ: convolutional neural network combined to local phase quantization based approach for face anti-spoofing"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-2673-9254","authenticated-orcid":false,"given":"Mebrouka","family":"Madi","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"Khammari","sequence":"additional","affiliation":[]},{"given":"Mohamed-Chaker","family":"Larabi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,20]]},"reference":[{"key":"18880_CR1","doi-asserted-by":"publisher","unstructured":"Anjos A, Marcel S (2011) Counter-measures to photo attacks in face recognition: a public database and a baseline. In: 2011 international joint conference on Biometrics (IJCB). IEEE, pp 1-7. https:\/\/doi.org\/10.1109\/IJCB.2011.6117503","DOI":"10.1109\/IJCB.2011.6117503"},{"key":"18880_CR2","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1109\/ACCESS.2014.2381273","volume":"2","author":"J Galbally","year":"2014","unstructured":"Galbally J, Marcel S, Fierrez J (2014) Biometric antispoofing methods: A survey in face recognition. IEEE Access 2:1530\u20131552. https:\/\/doi.org\/10.1109\/ACCESS.2014.2381273","journal-title":"IEEE Access"},{"issue":"5","key":"18880_CR3","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSP.2015.2437652","volume":"32","author":"A Hadid","year":"2015","unstructured":"Hadid A, Evans N, Marcel S, Fierrez J (2015) Biometrics systems under spoofing attack: An evaluation methodology and lessons learned. IEEE Signal Process Mag 32(5):20\u201330. https:\/\/doi.org\/10.1109\/MSP.2015.2437652","journal-title":"IEEE Signal Process Mag"},{"key":"18880_CR4","doi-asserted-by":"publisher","unstructured":"Li Y, Xu K, Yan Q, Li Y, Deng RH (2014) Understanding OSN-based facial disclosure against face authentication systems. In: Proceedings of the 9th ACM symposium on Information, computer and communications security. pp 413\u2013424. https:\/\/doi.org\/10.1145\/2590296.2590315","DOI":"10.1145\/2590296.2590315"},{"key":"18880_CR5","doi-asserted-by":"publisher","unstructured":"Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ (2012) A face antispoofing database with diverse attacks. In: 2012 5th IAPR international conference on Biometrics (ICB). IEEE, pp 26\u201331. https:\/\/doi.org\/10.1109\/ICB.2012.6199754","DOI":"10.1109\/ICB.2012.6199754"},{"key":"18880_CR6","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BF00994018","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20:273\u2013297. https:\/\/doi.org\/10.1007\/BF00994018","journal-title":"Mach Learn"},{"issue":"2","key":"18880_CR7","doi-asserted-by":"publisher","first-page":"169","DOI":"10.3233\/AIC-170729","volume":"30","author":"A Tharwat","year":"2017","unstructured":"Tharwat A, Gaber T, Ibrahim A, Hassanien AE (2017) Linear discriminant analysis: A detailed tutorial. AI Commun 30(2):169\u2013190. https:\/\/doi.org\/10.3233\/AIC-170729","journal-title":"AI Commun"},{"key":"18880_CR8","doi-asserted-by":"publisher","unstructured":"M\u00e4\u00e4tt\u00e4 J, Hadid A, Pietik\u00e4inen M (2011) Face spoofing detection from single images using micro-texture analysis. IEEE International Joint Conference on Biometrics (IJCB). pp 1\u20137. https:\/\/doi.org\/10.1109\/IJCB.2011.6117510","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"18880_CR9","doi-asserted-by":"publisher","unstructured":"Yang J, Lei Z, Liao S and Li SZ (2013) Face liveness detection with component dependent descriptor. International Conference on Biometrics (ICB). pp 1\u20136. https:\/\/doi.org\/10.1109\/ICB.2013.6612955","DOI":"10.1109\/ICB.2013.6612955"},{"key":"18880_CR10","doi-asserted-by":"publisher","unstructured":"Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. IEEE computer society conference on computer vision and pattern recognition (CVPR\u201905), vol. 1. pp 886\u2013893. https:\/\/doi.org\/10.1109\/CVPR.2005.177","DOI":"10.1109\/CVPR.2005.177"},{"key":"18880_CR11","doi-asserted-by":"publisher","unstructured":"Ojansivu V, Heikkil\u00e4 J (2008) Blur insensitive texture classification using local phase quantization. In: International conference on image and signal processing. Springer, pp 236\u2013243. https:\/\/doi.org\/10.1007\/978-3-540-69905-7_27","DOI":"10.1007\/978-3-540-69905-7_27"},{"key":"18880_CR12","doi-asserted-by":"publisher","unstructured":"Lazebnik S, Schmid C, Ponce J (2006) Beyond bags of features: Spatial pyramid matching for recognizing natural scene categories. IEEE computer society conference on computer vision and pattern recognition (CVPR\u201906), vol. 2. pp 2169\u20132178. https:\/\/doi.org\/10.1109\/CVPR.2006.68","DOI":"10.1109\/CVPR.2006.68"},{"key":"18880_CR13","unstructured":"Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: 2012 BIOSIG-proceedings of the international conference of biometrics special interest group (BIOSIG). IEEE, pp 1\u20137"},{"key":"18880_CR14","doi-asserted-by":"publisher","unstructured":"Boulkenafet Z, Komulainen J, Hadid A (2015) Face anti-spoofing based on color texture analysis. IEEE international conference on image processing (ICIP). pp 2636\u20132640. https:\/\/doi.org\/10.1109\/ICIP.2015.7351280","DOI":"10.1109\/ICIP.2015.7351280"},{"issue":"8","key":"18880_CR15","doi-asserted-by":"publisher","first-page":"1818","DOI":"10.1109\/TIFS.2016.2555286","volume":"11","author":"Z Boulkenafet","year":"2016","unstructured":"Boulkenafet Z, Komulainen J, Hadid A (2016) Face spoofing detection using colour texture analysis. IEEE Trans Inf Forensics Secur 11(8):1818\u20131830. https:\/\/doi.org\/10.1109\/TIFS.2016.2555286","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"18880_CR16","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/LSP.2016.2630740","volume":"24","author":"Z Boulkenafet","year":"2016","unstructured":"Boulkenafet Z, Komulainen J, Hadid A (2016) Face antispoofing using speeded-up robust features and fisher vector encoding. IEEE Signal Process Lett 24(2):141\u2013145. https:\/\/doi.org\/10.1109\/LSP.2016.2630740","journal-title":"IEEE Signal Process Lett"},{"issue":"4","key":"18880_CR17","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"D Wen","year":"2015","unstructured":"Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746\u2013761. https:\/\/doi.org\/10.1109\/TIFS.2015.2400395","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"18880_CR18","doi-asserted-by":"publisher","unstructured":"Singh AK, Joshi P, Nandi GC (2014) Face recognition with liveness detection using eye and mouth movement. IEEE international conference on signal propagation and computer technology (ICSPCT 2014). pp. 592\u2013597. https:\/\/doi.org\/10.1109\/ICSPCT.2014.6884911","DOI":"10.1109\/ICSPCT.2014.6884911"},{"issue":"12","key":"18880_CR19","doi-asserted-by":"publisher","first-page":"2270","DOI":"10.1016\/j.patcog.2005.01.012","volume":"38","author":"A Jain","year":"2005","unstructured":"Jain A, Nandakumar K, Ross A (2005) Score normalization in multimodal biometric systems. Elsevier Pattern Recognit 38(12):2270\u20132285. https:\/\/doi.org\/10.1016\/j.patcog.2005.01.012","journal-title":"Elsevier Pattern Recognit"},{"key":"18880_CR20","doi-asserted-by":"publisher","unstructured":"George A, Marcel S (2019) Deep pixel-wise binary supervision for face presentation attack detection. In 2019 International Conference on Biometrics (ICB). IEEE, pp 1\u20138. https:\/\/doi.org\/10.1109\/ICB45273.2019.8987370","DOI":"10.1109\/ICB45273.2019.8987370"},{"key":"18880_CR21","doi-asserted-by":"publisher","unstructured":"Huang G, Liu Z, Van Der Maaten L, Weinberger KQ (2017) Densely connected convolutional networks. In Proceedings of the IEEE conference on computer vision and pattern recognition. pp 4700\u20134708. https:\/\/doi.org\/10.48550\/arXiv.1608.06993","DOI":"10.48550\/arXiv.1608.06993"},{"issue":"14","key":"18880_CR22","doi-asserted-by":"publisher","first-page":"5196","DOI":"10.3390\/s22145196","volume":"22","author":"F Abdullakutty","year":"2022","unstructured":"Abdullakutty F, Johnston P, Elyan E (2022) Fusion Methods for Face Presentation Attack Detection. Sensors 22(14):5196. https:\/\/doi.org\/10.3390\/s22145196","journal-title":"Sensors"},{"issue":"6","key":"18880_CR23","doi-asserted-by":"publisher","first-page":"2223","DOI":"10.1007\/s12559-022-10037-z","volume":"14","author":"F Abdullakutty","year":"2022","unstructured":"Abdullakutty F, Elyan E, Johnston P, Ali-Gombe A (2022) Deep transfer learning on the aggregated dataset for face presentation attack detection. Cogn Comput 14(6):2223\u20132233. https:\/\/doi.org\/10.1007\/s12559-022-10037-z","journal-title":"Cogn Comput"},{"key":"18880_CR24","doi-asserted-by":"publisher","unstructured":"Satapathy A, Livingston LM, Jenila (2021) A lite convolutional neural network built on permuted Xceptio-inception and Xceptio-reduction modules for texture based facial liveness recognition. Multimed Tools Appl 80:10441\u201310472. https:\/\/doi.org\/10.1007\/s11042-020-10181-4","DOI":"10.1007\/s11042-020-10181-4"},{"issue":"12","key":"18880_CR25","doi-asserted-by":"publisher","first-page":"375","DOI":"10.3390\/fi14120375","volume":"14","author":"T Gwyn","year":"2022","unstructured":"Gwyn T, Roy K (2022) Examining gender bias of convolutional neural networks via facial recognition. Fut Intern 14(12):375. https:\/\/doi.org\/10.3390\/fi14120375","journal-title":"Fut Intern"},{"issue":"6","key":"18880_CR26","doi-asserted-by":"publisher","first-page":"10495","DOI":"10.3934\/math.2022585","volume":"7","author":"D Wang","year":"2022","unstructured":"Wang D, Ma G, Liu X (2022) An intelligent recognition framework of access control system with anti-spoofing function. AIMS Math 7(6):10495\u201310512. https:\/\/doi.org\/10.3934\/math.2022585","journal-title":"AIMS Math"},{"key":"18880_CR27","doi-asserted-by":"publisher","unstructured":"Li L, Feng X, Boulkenafet Z, Xia Z, Li M, Hadid A (2016) An original face anti-spoofing approach using partial convolutional neural network. In 2016 Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA). IEEE, pp 1\u20136. https:\/\/doi.org\/10.1109\/IPTA.2016.7821013","DOI":"10.1109\/IPTA.2016.7821013"},{"key":"18880_CR28","doi-asserted-by":"publisher","unstructured":"Yang X, Luo W, Bao L, Gao Y, Gong D, Zheng S, Li Z, Liu W (2019) Face anti-spoofing: Model matters, so does data. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp 3507\u20133516. https:\/\/doi.org\/10.1109\/CVPR.2019.00362","DOI":"10.1109\/CVPR.2019.00362"},{"key":"18880_CR29","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1109\/TIFS.2020.3029879","volume":"16","author":"D Deb","year":"2020","unstructured":"Deb D, Jain AK (2020) Look locally infer globally: A generalizable face anti-spoofing approach. IEEE Trans Inf Forensics Secur 16:1143\u20131157. https:\/\/doi.org\/10.1109\/TIFS.2020.3029879","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"18880_CR30","doi-asserted-by":"publisher","unstructured":"Shao R, Lan X, Li J, Yuen PC (2019) Multi-adversarial discriminative deep domain generalization for face presentation attack detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp 10023\u201310031. https:\/\/doi.org\/10.1109\/CVPR.2019.01026","DOI":"10.1109\/CVPR.2019.01026"},{"key":"18880_CR31","doi-asserted-by":"publisher","unstructured":"de Souza GB, Papa JP, Marana AN (2018) On the learning of deep local features for robust face spoofing detection. In: 2018 31st SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI). IEEE, pp 258\u2013265. https:\/\/doi.org\/10.1109\/SIBGRAPI.2018.00040","DOI":"10.1109\/SIBGRAPI.2018.00040"},{"key":"18880_CR32","doi-asserted-by":"publisher","unstructured":"Sun CY, Chen SL, Li XJ, Chen F, Yin XC (2022) Danet: Dynamic attention to spoof patterns for face anti-spoofing. In: 2022 26th International Conference on Pattern Recognition (ICPR). IEEE, pp 1929\u20131936. https:\/\/doi.org\/10.1109\/ICPR56361.2022.9956725","DOI":"10.1109\/ICPR56361.2022.9956725"},{"issue":"19","key":"18880_CR33","doi-asserted-by":"publisher","first-page":"3056","DOI":"10.3390\/electronics11193056","volume":"11","author":"Y Kong","year":"2022","unstructured":"Kong Y, Li X, Hao G, Liu C (2022) Face Anti-Spoofing Method Based on Residual Network with Channel Attention Mechanism. J Electron 11(19):3056. https:\/\/doi.org\/10.3390\/electronics11193056","journal-title":"J Electron"},{"key":"18880_CR34","doi-asserted-by":"publisher","unstructured":"Liu Y, Jourabloo A, Liu X (2018) Learning deep models for face anti-spoofing: Binary or auxiliary supervision. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp 389\u2013398. https:\/\/doi.org\/10.48550\/arXiv.1803.11097","DOI":"10.48550\/arXiv.1803.11097"},{"key":"18880_CR35","doi-asserted-by":"crossref","unstructured":"da Silva VL, L\u00e9rida JL, Sarret M, Valls M, Gin\u00e9 F (2023) Residual spatiotemporal convolutional networks for face anti-spoofing. Journal of Visual Communication and Image Representation. Elsevier, page 103744. https:\/\/doi.org\/10.1016\/j.jvcir.2022.103744","DOI":"10.1016\/j.jvcir.2022.103744"},{"key":"18880_CR36","doi-asserted-by":"publisher","unstructured":"Xu Z, Li S, Deng W (2015) Learning temporal features using LSTM-CNN architecture for face anti-spoofing. In 2015 3rd IAPR asian conference on pattern recognition (ACPR). IEEE, pp 141\u2013145. https:\/\/doi.org\/10.1109\/ACPR.2015.7486482","DOI":"10.1109\/ACPR.2015.7486482"},{"key":"18880_CR37","doi-asserted-by":"publisher","unstructured":"Guo J, Zhu X, Xiao J, Lei Z, Wan G, Li SZ (2019) Improving face anti-spoofing by 3d virtual synthesis. In: 2019 International Conference on Biometrics (ICB). IEEE, pp 1\u20138. https:\/\/doi.org\/10.1109\/ICB45273.2019.8987415","DOI":"10.1109\/ICB45273.2019.8987415"},{"key":"18880_CR38","doi-asserted-by":"publisher","unstructured":"Hashemifard S, Akbari M (2021) A compact deep learning model for face spoofing detection. arXiv:2101.04756, https:\/\/doi.org\/10.48550\/arXiv.2101.04756","DOI":"10.48550\/arXiv.2101.04756"},{"issue":"11","key":"18880_CR39","doi-asserted-by":"publisher","first-page":"1880","DOI":"10.1049\/iet-ipr.2018.5560","volume":"13","author":"M Khammari","year":"2019","unstructured":"Khammari M (2019) Robust face anti-spoofing using CNN with LBP and WLD. IET Image Proc 13(11):1880\u20131884. https:\/\/doi.org\/10.1049\/iet-ipr.2018.5560","journal-title":"IET Image Proc"},{"key":"18880_CR40","doi-asserted-by":"publisher","unstructured":"Patel K, Han H, Jain AK (2016) Cross-database face antispoofing with robust feature representation. Biometric Recognition: 11th Chinese Conference, CCBR 2016, Chengdu, China, October 14-16, 2016, Proceedings 11. Springer, pp 611\u2013619. https:\/\/doi.org\/10.1007\/978-3-319-46654-5_67","DOI":"10.1007\/978-3-319-46654-5_67"},{"key":"18880_CR41","doi-asserted-by":"publisher","unstructured":"Atoum Y, Liu Y, Jourabloo A, Liu X (2017) Face anti-spoofing using patch and depth-based CNNs. In 2017 IEEE International Joint Conference on Biometrics (IJCB). IEEE, pp 319\u2013328. https:\/\/doi.org\/10.1109\/BTAS.2017.8272713","DOI":"10.1109\/BTAS.2017.8272713"},{"key":"18880_CR42","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1109\/TIFS.2019.2922241","volume":"15","author":"H Chen","year":"2019","unstructured":"Chen H, Hu G, Lei Z, Chen Y, Robertson NM, Li SZ (2019) Attention-based two-stream convolutional networks for face spoofing detection. IEEE Trans Inf Forensics Secur 15:578\u2013593. https:\/\/doi.org\/10.1109\/TIFS.2019.2922241","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"18880_CR43","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1016\/j.jvcir.2017.09.002","volume":"49","author":"Y Wang","year":"2017","unstructured":"Wang Y, Nian F, Li T, Meng Z, Wang K (2017) Robust face anti-spoofing with depth information. J Vis Commun Image Represent 49:332\u2013337. https:\/\/doi.org\/10.1016\/j.jvcir.2017.09.002","journal-title":"J Vis Commun Image Represent"},{"key":"18880_CR44","doi-asserted-by":"publisher","unstructured":"Asim M, Ming Z, Javed MY (2017) CNN based spatio-temporal feature extraction for face anti-spoofing. In: 2017 2nd International Conference on Image, Vision and Computing (ICIVC). IEEE, pp 234-238. https:\/\/doi.org\/10.1109\/ICIVC.2017.7984552","DOI":"10.1109\/ICIVC.2017.7984552"},{"key":"18880_CR45","doi-asserted-by":"publisher","unstructured":"Antil A, Dhiman C (2023) A two stream face anti-spoofing framework using multi-level deep features and ELBP features. Multimedia Systems. Springer, pp 1\u201316. https:\/\/doi.org\/10.1007\/s00530-023-01060-7","DOI":"10.1007\/s00530-023-01060-7"},{"key":"18880_CR46","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1016\/j.jvcir.2016.03.019","volume":"38","author":"L Feng","year":"2016","unstructured":"Feng L, Po LM, Li Y, Xu X, Yuan F, Cheung TCH, Cheung KW (2016) Integration of image quality and motion cues for face anti-spoofing: A neural network approach. J Vis Commun Image Represent 38:451\u2013460. https:\/\/doi.org\/10.1016\/j.jvcir.2016.03.019","journal-title":"J Vis Commun Image Represent"},{"key":"18880_CR47","doi-asserted-by":"publisher","first-page":"119988","DOI":"10.1016\/j.eswa.2023.119988","volume":"224","author":"X Shu","year":"2023","unstructured":"Shu X, Li X, Zuo X, Xu D, Shi J (2023) Face spoofing detection based on multi-scale color inversion dual-stream convolutional neural network. Expert Syst Appl 224:119988. https:\/\/doi.org\/10.1016\/j.eswa.2023.119988","journal-title":"Expert Syst Appl"},{"issue":"10","key":"18880_CR48","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang K, Zhang Z, Li Z, Qiao Y (2016) Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process Lett 23(10):1499\u20131503. https:\/\/doi.org\/10.1109\/LSP.2016.2603342","journal-title":"IEEE Signal Process Lett"},{"key":"18880_CR49","doi-asserted-by":"publisher","first-page":"106805","DOI":"10.1016\/j.asoc.2020.106805","volume":"97","author":"G Bargshady","year":"2020","unstructured":"Bargshady G, Zhou X, Deo RC, Soar J, Whittaker F, Wang H (2020) The modeling of human facial pain intensity based on temporal convolutional networks trained with video frames in HSV color space. Appl Soft Comput 97:106805. https:\/\/doi.org\/10.1016\/j.asoc.2020.106805","journal-title":"Appl Soft Comput"},{"key":"18880_CR50","doi-asserted-by":"publisher","unstructured":"Rahman MA, Purnama IKE, Purnomo MH (2014) Simple method of human skin detection using HSV and YCbCr color spaces. In: 2014 international conference on intelligent autonomous agents, networks and systems. IEEE, pp 58\u201361. https:\/\/doi.org\/10.1109\/INAGENTSYS.2014.7005726","DOI":"10.1109\/INAGENTSYS.2014.7005726"},{"key":"18880_CR51","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.ins.2017.08.059","volume":"420","author":"Y Xiao","year":"2017","unstructured":"Xiao Y, Cao Z, Wang L, Li T (2017) Local phase quantization plus: A principled method for embedding local phase quantization into fisher vector for blurred image recognition. Inf Sci 420:77\u201395. https:\/\/doi.org\/10.1016\/j.ins.2017.08.059","journal-title":"Inf Sci"},{"key":"18880_CR52","doi-asserted-by":"publisher","unstructured":"Ramachandran P, Zoph B, Le QV (2017) Searching for activation functions. Technical report, 7(1):5. arXiv:1710.05941, https:\/\/doi.org\/10.48550\/arXiv.1710.05941","DOI":"10.48550\/arXiv.1710.05941"},{"key":"18880_CR53","unstructured":"Nair V, Hinton GE (2010) Rectified linear units improve restricted boltzmann machines. In: Proceedings of the 27th international conference on machine learning (ICML-10). pp 807\u2013814"},{"key":"18880_CR54","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.matcom.2015.11.005","volume":"133","author":"A Iliev","year":"2017","unstructured":"Iliev A, Kyurkchiev N, Markov S (2017) On the approximation of the step function by some sigmoid functions. Math Comput Simul 133:223\u2013234. https:\/\/doi.org\/10.1016\/j.matcom.2015.11.005","journal-title":"Math Comput Simul"},{"key":"18880_CR55","doi-asserted-by":"publisher","unstructured":"Chollet F (2017) Xception: Deep learning with depthwise separable convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp 1251\u20131258. https:\/\/doi.org\/10.48550\/arXiv.1610.02357","DOI":"10.48550\/arXiv.1610.02357"},{"key":"18880_CR56","doi-asserted-by":"publisher","unstructured":"Lanjewar MG, Morajkar P, P P, (2023) Modified transfer learning frameworks to identify potato leaf diseases. Multimed Tools Appl 1\u201323. https:\/\/doi.org\/10.1007\/s11042-023-17610-0","DOI":"10.1007\/s11042-023-17610-0"},{"issue":"7","key":"18880_CR57","doi-asserted-by":"publisher","first-page":"10313","DOI":"10.1007\/s11042-022-12200-y","volume":"81","author":"MG Lanjewar","year":"2022","unstructured":"Lanjewar MG, Gurav OL (2022) Convolutional Neural Networks based classifications of soil images. Multimed Tools Appl 81(7):10313\u201310336. https:\/\/doi.org\/10.1007\/s11042-022-12200-y","journal-title":"Multimed Tools Appl"},{"key":"18880_CR58","doi-asserted-by":"publisher","unstructured":"Abadi M, Agarwal A, Barham P, Brevdo E, Chen Z, Citro C, Corrado GS, Davis A, Dean J, Devin M, et al. (2016) Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv:1603.04467, https:\/\/doi.org\/10.48550\/arXiv.1603.04467","DOI":"10.48550\/arXiv.1603.04467"},{"key":"18880_CR59","doi-asserted-by":"publisher","first-page":"4806","DOI":"10.1109\/ACCESS.2019.2962617","volume":"8","author":"Y Ho","year":"2019","unstructured":"Ho Y, Wookey S (2019) The real-world-weight cross-entropy loss function: Modeling the costs of mislabeling. IEEE Access 8:4806\u20134813. https:\/\/doi.org\/10.1109\/ACCESS.2019.2962617","journal-title":"IEEE Access"},{"key":"18880_CR60","doi-asserted-by":"publisher","unstructured":"Kingma DP, Ba J (2014) Adam: A method for stochastic optimization. arXiv:1412.6980, https:\/\/doi.org\/10.48550\/arXiv.1412.6980","DOI":"10.48550\/arXiv.1412.6980"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18880-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-18880-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18880-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T10:20:05Z","timestamp":1734085205000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-18880-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,20]]},"references-count":60,"journal-issue":{"issue":"40","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["18880"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-18880-y","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,3,20]]},"assertion":[{"value":"26 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}