{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T20:43:21Z","timestamp":1760647401947},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,2,16]],"date-time":"2021-02-16T00:00:00Z","timestamp":1613433600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,16]],"date-time":"2021-02-16T00:00:00Z","timestamp":1613433600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11277-021-08186-9","type":"journal-article","created":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T03:31:07Z","timestamp":1613705467000},"page":"3403-3433","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Performance Evaluation of Machine Learning Based Face Recognition Techniques"],"prefix":"10.1007","volume":"118","author":[{"given":"Sahil","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Vijay","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,16]]},"reference":[{"key":"8186_CR1","doi-asserted-by":"crossref","unstructured":"Hsu, H. J., & Chen, K. T. (2015) Face recognition on drones: Issues and limitations. In\u00a0Proceedings of the First Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use;\u00a039-44.","DOI":"10.1145\/2750675.2750679"},{"key":"8186_CR2","doi-asserted-by":"crossref","unstructured":"S. Gupta, M. K. Markey and A. C. Bovik. (2007) Advancing the state of the art in 3D human face recognition.\u00a0SPIE Newsroom.","DOI":"10.1117\/2.1200705.0727"},{"issue":"1145\/2976749","key":"8186_CR3","first-page":"2978392","volume":"10","author":"M Sharif","year":"2016","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L., et al. (2016). Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. SIGSAC Conference on Computer and Communications Security, 10(1145\/2976749), 2978392.","journal-title":"SIGSAC Conference on Computer and Communications Security"},{"key":"8186_CR4","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/4721849","author":"Z Akhtar","year":"2016","unstructured":"Akhtar, Z., & Foresti, G. L. (2016). Face spoof attack recognition using discriminative image patches. Journal of Electrical and Computer Engineering. https:\/\/doi.org\/10.1155\/2016\/4721849.","journal-title":"Journal of Electrical and Computer Engineering"},{"issue":"3","key":"8186_CR5","doi-asserted-by":"publisher","first-page":"1060","DOI":"10.1109\/TIP.2015.2395951","volume":"24","author":"R Raghavendra","year":"2015","unstructured":"Raghavendra, R., Raja, K. B., & Busch, C. (2015). Presentation attack detection for face recognition using light field camera. IEEE Transactions on Image Processing., 24(3), 1060\u20131075.","journal-title":"IEEE Transactions on Image Processing."},{"key":"8186_CR6","unstructured":"Chen, X., Liu, C., Li, B., Lu, K., & Song, D. (2017) Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526"},{"key":"8186_CR7","doi-asserted-by":"publisher","DOI":"10.1142\/S0217984918502123","author":"S Sharma","year":"2018","unstructured":"Sharma, S., & Kumar, V. (2018). Performance evaluation of 2D face recognition techniques under image processing attacks. Modern Physics Letters B. https:\/\/doi.org\/10.1142\/S0217984918502123.","journal-title":"Modern Physics Letters B"},{"key":"8186_CR8","doi-asserted-by":"publisher","DOI":"10.1080\/13682199.2018.1509176","author":"Erfan Zangeneh","year":"2018","unstructured":"Zangeneh, Erfan, & Moradi, Aref. (2018). Facial expression recognition by using differential geometric features. The Imaging Science Journal. https:\/\/doi.org\/10.1080\/13682199.2018.1509176.","journal-title":"The Imaging Science Journal."},{"issue":"5","key":"8186_CR9","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1080\/13682199.2017.1338815","volume":"65","author":"Fawad Ahmad","year":"2017","unstructured":"Ahmad, Fawad, Khan, Asif, Islam, Ihtesham Ul, et al. (2017). Illumination normalization using independent component analysis and filtering. The Imaging Science Journal., 65(5), 308\u2013313. https:\/\/doi.org\/10.1080\/13682199.2017.1338815.","journal-title":"The Imaging Science Journal."},{"issue":"6","key":"8186_CR10","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1080\/13682199.2016.1219117","volume":"64","author":"S-C Hsia","year":"2016","unstructured":"Hsia, S.-C., Chen, C.-J., & Yang, W.-C. (2016). Improvement of face recognition using light compensation technique on real-time imaging. The Imaging Science Journal., 64(6), 334\u2013340. https:\/\/doi.org\/10.1080\/13682199.2016.1219117.","journal-title":"The Imaging Science Journal."},{"key":"8186_CR11","doi-asserted-by":"publisher","DOI":"10.1080\/13682199.2018.1517857","author":"Vitalius Parubochyi","year":"2018","unstructured":"Parubochyi, Vitalius, & Shuwar, Roman. (2018). Fast self-quotient image method for lighting normalization based on modified Gaussian filter kernel. The Imaging Science Journal. https:\/\/doi.org\/10.1080\/13682199.2018.1517857.","journal-title":"The Imaging Science Journal"},{"issue":"7","key":"8186_CR12","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1179\/1743131X14Y.0000000071","volume":"63","author":"R Sharma","year":"2015","unstructured":"Sharma, R., & Patterh, M. S. (2015). A broad review about face recognition \u2013 feature extraction and recognition techniques. The Imaging Science Journal., 63(7), 361\u2013377. https:\/\/doi.org\/10.1179\/1743131X14Y.0000000071.","journal-title":"The Imaging Science Journal."},{"key":"8186_CR13","first-page":"226","volume":"3657","author":"M Kutter","year":"1999","unstructured":"Kutter, M., & Petitcolas, F. A. (1999). Fair benchmark for image watermarking systems in security and watermarking of multimedia contents. International Society for Optics and Photonics, 3657, 226\u2013240.","journal-title":"International Society for Optics and Photonics"},{"issue":"3","key":"8186_CR14","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., & Vapnik, V. (1995). Support-vector networks. Machine learning., 20(3), 273\u2013297.","journal-title":"Machine learning."},{"issue":"3","key":"8186_CR15","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/0167-8655(86)90013-9","volume":"4","author":"EV Ruiz","year":"1986","unstructured":"Ruiz, E. V. (1986). An algorithm for finding nearest neighbours in (approximately) constant average time. Pattern Recognition Letters, 4(3), 145\u2013157.","journal-title":"Pattern Recognition Letters"},{"issue":"3","key":"8186_CR16","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/S0020-7373(87)80053-6","volume":"27","author":"JR Quinlan","year":"1987","unstructured":"Quinlan, J. R. (1987). Simplifying decision trees. International journal of man-machine studies, 27(3), 221\u2013234.","journal-title":"International journal of man-machine studies"},{"key":"8186_CR17","unstructured":"Mika, S., Ratsch, G., Weston, J., et al. (1999) Fisher discriminant analysis with kernels. In\u00a0Neural networks for signal processing IX. Proceedings of the 1999 IEEE signal processing society workshop. 41-48. IEEE."},{"issue":"2","key":"8186_CR18","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1023\/A:1007607513941","volume":"40","author":"TG Dietterich","year":"2000","unstructured":"Dietterich, T. G. (2000). An experimental comparison of three methods for constructing ensembles of decision trees: Bagging, boosting, and randomization. Machine learning, 40(2), 139\u2013157.","journal-title":"Machine learning"},{"key":"8186_CR19","first-page":"1","volume-title":"International workshop on multiple classifier systems","author":"TG Dietterich","year":"2000","unstructured":"Dietterich, T. G. (2000). Ensemble methods in machine learning. International workshop on multiple classifier systems (pp. 1\u201315). Berlin, Heidelberg: Springer."},{"key":"8186_CR20","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-540-89991-4_6","volume-title":"European Workshop on Biometrics and Identity Management","author":"A Savran","year":"2008","unstructured":"Savran, A., Aly\u00fcz, N., Dibeklio\u011flu, H., et al. (2008). Bosphorus database for 3D face analysis. European Workshop on Biometrics and Identity Management (pp. 47\u201356). Berlin, Heidelberg: Springer."},{"key":"8186_CR21","doi-asserted-by":"crossref","unstructured":"Colombo, A., Cusano, C., & Schettini, R. (2011) UMB-DB: A database of partially occluded 3D faces. IEEE International Conference onComputer Vision Workshops (ICCV Workshops). 2113-2119. IEEE.","DOI":"10.1109\/ICCVW.2011.6130509"},{"issue":"3","key":"8186_CR22","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s10551-008-9717-0","volume":"84","author":"SW Nicholson","year":"2009","unstructured":"Nicholson, S. W., & Bennett, T. B. (2009). Transparent practices: primary and secondary data in business ethics dissertations. Journal of business ethics, 84(3), 417\u2013425.","journal-title":"Journal of business ethics"},{"issue":"3","key":"8186_CR23","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/s10462-015-9431-0","volume":"44","author":"H Patil","year":"2015","unstructured":"Patil, H., Kothari, A., & Bhurchandi, K. (2015). 3-D face recognition: features, databases, algorithms and challenges. Artificial Intelligence Review, 44(3), 393\u2013441.","journal-title":"Artificial Intelligence Review"},{"key":"8186_CR24","doi-asserted-by":"crossref","unstructured":"Dalal, N., & Triggs, B. (2005) Histograms of oriented gradients for human detection. IEEE Computer Society Conference on\u00a0Computer Vision and Pattern Recognition. CVPR.\u00a01: 886-893. IEEE.","DOI":"10.1109\/CVPR.2005.177"},{"key":"8186_CR25","first-page":"404","volume-title":"European conference on computer vision","author":"H Bay","year":"2006","unstructured":"Bay, H., Tuytelaars, T., & Gool, L. (2006). Surf: Speeded up robust features. European conference on computer vision (pp. 404\u2013417). Berlin, Heidelberg: Springer."},{"key":"8186_CR26","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1109\/TPAMI.2006.244","volume":"12","author":"T Ahonen","year":"2006","unstructured":"Ahonen, T., Hadid, A., & Pietikainen, M. (2006). Face description with local binary patterns: Application to face recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 12, 2037\u20132041.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"8186_CR27","doi-asserted-by":"crossref","unstructured":"Mita, T., Kaneko, T., & Hori, O. (2005) Joint haar-like features for face detection. Tenth IEEE International Conference on\u00a0Computer Vision ICCV. 2: 1619-1626. IEEE.","DOI":"10.1109\/ICCV.2005.129"},{"issue":"6","key":"8186_CR28","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1109\/TSMC.1973.4309314","volume":"3","author":"RM Haralick","year":"1973","unstructured":"Haralick, R. M., Shanmugam, K., & Dinstein, I. H. (1973). Textural features for image classification. IEEE Transactions on systems, man, and cybernetics, 3(6), 610\u2013621.","journal-title":"IEEE Transactions on systems, man, and cybernetics"},{"issue":"3","key":"8186_CR29","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/0146-664X(80)90054-4","volume":"14","author":"PE Danielsson","year":"1980","unstructured":"Danielsson, P. E. (1980). Euclidean distance mapping. Computer Graphics and image processing, 14(3), 227\u2013248.","journal-title":"Computer Graphics and image processing"},{"issue":"2","key":"8186_CR30","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/BF02289694","volume":"29","author":"JB Kruskal","year":"1964","unstructured":"Kruskal, J. B. (1964). Nonmetric multidimensional scaling: a numerical method. Psychometrika, 29(2), 115\u2013129.","journal-title":"Psychometrika"},{"issue":"1","key":"8186_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0169-7439(99)00047-7","volume":"50","author":"R De Maesschalck","year":"2000","unstructured":"De Maesschalck, R., Jouan-Rimbaud, D., & Massart, D. L. (2000). The mahalanobis distance. Chemometrics and intelligent laboratory systems, 50(1), 1\u201318.","journal-title":"Chemometrics and intelligent laboratory systems"},{"issue":"4857","key":"8186_CR32","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1126\/science.3287615","volume":"240","author":"JA Swets","year":"1988","unstructured":"Swets, J. A. (1988). Measuring the accuracy of diagnostic systems. Science, 240(4857), 1285\u20131293.","journal-title":"Science"},{"issue":"4","key":"8186_CR33","doi-asserted-by":"publisher","first-page":"45","DOI":"10.5120\/1370-1846","volume":"9","author":"P Patidar","year":"2010","unstructured":"Patidar, P., Gupta, M., Srivastava, S., & Nagawat, A. K. (2010). Image de-noising by various filters for different noise. International journal of computer applications., 9(4), 45\u201350.","journal-title":"International journal of computer applications."},{"key":"8186_CR34","unstructured":"http:\/\/www.nptel.ac.in\/courses\/117104069\/chapter_8\/8_32.html"},{"issue":"5","key":"8186_CR35","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/83.918569","volume":"10","author":"CY Lin","year":"2001","unstructured":"Lin, C. Y., Wu, M., Bloom, J. A., et al. (2001). Rotation, scale, and translation resilient watermarking for images. IEEE Transactions on image processing., 10(5), 767\u2013782.","journal-title":"IEEE Transactions on image processing."},{"issue":"2","key":"8186_CR36","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/S0734-189X(85)80071-2","volume":"32","author":"R Gershon","year":"1985","unstructured":"Gershon, R. (1985). Aspects of perception and computation in color vision. Computer vision, graphics, and image processing., 32(2), 244\u2013277.","journal-title":"Computer vision, graphics, and image processing."},{"key":"8186_CR37","unstructured":"Martucci, S. A. (1995). Image resizing in the discrete cosine transform domain. Proceedings on International Conference on\u00a0Image Processing. 2: 244-247. IEEE."},{"key":"8186_CR38","doi-asserted-by":"crossref","unstructured":"Mather, P., & Tso, B.\u00a0(2016) Classification methods for remotely sensed data. CRC press.","DOI":"10.1201\/9781420090741"},{"key":"8186_CR39","unstructured":"Benzarti, F., & Amiri, H. (2013) Speckle noise reduction in medical ultrasound images. arXiv preprint arXiv:1712.05526arXiv:1712.05526"},{"key":"8186_CR40","doi-asserted-by":"crossref","unstructured":"Chandra, E., & Kanagalakshmi, K. (2011) Cancelable biometric template generation and protection schemes: A review. 3rd International Conference on\u00a0Electronics Computer Technology (ICECT). 5: 15-20. IEEE.","DOI":"10.1109\/ICECTECH.2011.5941948"},{"issue":"9","key":"8186_CR41","doi-asserted-by":"publisher","first-page":"980","DOI":"10.1016\/j.patrec.2013.01.028","volume":"34","author":"Y Xu","year":"2013","unstructured":"Xu, Y., Zhu, Q., Fan, Z., et al. (2013). Coarse to fine K nearest neighbor classifier. Pattern Recognition Letters, 34(9), 980\u2013986.","journal-title":"Pattern Recognition Letters"},{"key":"8186_CR42","unstructured":"Hassanat, A. B., Abbadi, M. A., Altarawneh, G. A., et al. (2014) Solving the problem of the K parameter in the KNN classifier using an ensemble learning approach.\u00a0arXiv preprint arXiv:1409.0919"},{"key":"8186_CR43","first-page":"709","volume-title":"Asian conference on computer vision","author":"HV Nguyen","year":"2010","unstructured":"Nguyen, H. V., & Cosine Bai, L. (2010). similarity metric learning for face verification. Asian conference on computer vision (pp. 709\u2013720). Berlin, Heidelberg: Springer."},{"key":"8186_CR44","first-page":"513","volume":"17","author":"J Goldberger","year":"2005","unstructured":"Goldberger, J., Hinton, G. E., Roweis, S. T., et al. (2005). Neighbourhood components analysis. Advances in neural information processing systems, 17, 513\u2013520.","journal-title":"Advances in neural information processing systems"},{"issue":"3","key":"8186_CR45","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1145\/331499.331504","volume":"31","author":"AK Jain","year":"1999","unstructured":"Jain, A. K., Murty, M. N., & Flynn, P. J. (1999). Data clustering: A review. ACM computing surveys (CSUR), 31(3), 264\u2013323.","journal-title":"ACM computing surveys (CSUR)"},{"issue":"2","key":"8186_CR46","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"CJ Burges","year":"1998","unstructured":"Burges, C. J. (1998). A tutorial on support vector machines for pattern recognition. Data mining and knowledge discovery, 2(2), 121\u2013167.","journal-title":"Data mining and knowledge discovery"},{"issue":"4","key":"8186_CR47","doi-asserted-by":"publisher","first-page":"465","DOI":"10.3934\/jimo.2005.1.465","volume":"1","author":"K Schittkowski","year":"2005","unstructured":"Schittkowski, K. (2005). Optimal parameter selection in support vector machines. Journal of Industrial and Management Optimization, 1(4), 465.","journal-title":"Journal of Industrial and Management Optimization"},{"key":"8186_CR48","unstructured":"Souza, C. R. (2010) Kernel functions for machine learning applications.\u00a0Creative Commons Attribution-Noncommercial-Share Alike.3: 29."},{"key":"8186_CR49","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.neucom.2004.11.022","volume":"64","author":"F Friedrichs","year":"2005","unstructured":"Friedrichs, F., & Igel, C. (2005). Evolutionary tuning of multiple SVM parameters. Neurocomputing, 64, 107\u2013117.","journal-title":"Neurocomputing"},{"issue":"4","key":"8186_CR50","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TSMCB.2007.895328","volume":"37","author":"J Huang","year":"2007","unstructured":"Huang, J., Yuen, P. C., Chen, W. S., et al. (2007). Choosing parameters of kernel subspace LDA for recognition of face images under pose and illumination variations. IEEE Transactions on Systems, Man, and Cybernetics, Part B Cybernetics, 37(4), 847\u2013862.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B Cybernetics"},{"issue":"27","key":"8186_CR51","doi-asserted-by":"publisher","first-page":"209","DOI":"10.19101\/IJACR.2016.627008","volume":"6","author":"H Binol","year":"2016","unstructured":"Binol, H., Cukur, H., & Bal, A. (2016). A supervised discriminant subspaces-based ensemble learning for binary classification. International Journal of Advanced Computer Research, 6(27), 209.","journal-title":"International Journal of Advanced Computer Research"},{"issue":"35","key":"8186_CR52","doi-asserted-by":"publisher","first-page":"26517","DOI":"10.1007\/s11042-020-09331-5","volume":"79","author":"S Sharma","year":"2020","unstructured":"Sharma, S., & Kumar, V. (2020). Voxel-based 3D occlusion-invariant face recognition using game theory and simulated annealing. Multimedia Tools and Applications, 79(35), 26517\u201326547.","journal-title":"Multimedia Tools and Applications"},{"key":"8186_CR53","first-page":"25","volume":"79","author":"S Sharma","year":"2020","unstructured":"Sharma, S., & Kumar, V. (2020). Voxel-based 3D face reconstruction and its application to face recognition using sequential deep learning. Multimedia Tools and Applications, 79, 25\u201326.","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"8186_CR54","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1049\/bme2.12005","volume":"10","author":"S Sharma","year":"2021","unstructured":"Sharma, S., & Kumar, V. (2021). 3D landmark-based face restoration for recognition using variational autoencoder and triplet loss. IET Biometrics, 10(1), 87\u201398.","journal-title":"IET Biometrics"},{"key":"8186_CR55","doi-asserted-by":"crossref","unstructured":"Goswami, G., Ratha, N., Agarwal, A., Singh, R. and Vatsa, M., (2018). Unravelling robustness of deep learning based face recognition against adversarial attacks.\u00a0arXiv preprint arXiv:1803.00401","DOI":"10.1609\/aaai.v32i1.12341"},{"key":"8186_CR56","doi-asserted-by":"crossref","unstructured":"Zhu, Z.A., Lu, Y.Z. and Chiang, C.K., (2019), September. Generating adversarial examples by makeup attacks on face recognition. In\u00a02019 IEEE International Conference on Image Processing (ICIP)\u00a0(pp. 2516-2520). IEEE.","DOI":"10.1109\/ICIP.2019.8803269"},{"issue":"6\u20137","key":"8186_CR57","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1007\/s11263-019-01160-w","volume":"127","author":"G Goswami","year":"2019","unstructured":"Goswami, G., Agarwal, A., Ratha, N., Singh, R., & Vatsa, M. (2019). Detecting and mitigating adversarial perturbations for robust face recognition. International Journal of Computer Vision, 127(6\u20137), 719\u2013742.","journal-title":"International Journal of Computer Vision"},{"issue":"1","key":"8186_CR58","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/TBIOM.2019.2946175","volume":"2","author":"K Kotwal","year":"2019","unstructured":"Kotwal, K., Mostaani, Z., & Marcel, S. (2019). Detection of age-induced makeup attacks on face recognition systems using multi-layer deep features. IEEE Transactions on Biometrics, Behavior, and Identity Science, 2(1), 15\u201325.","journal-title":"IEEE Transactions on Biometrics, Behavior, and Identity Science"},{"issue":"3","key":"8186_CR59","doi-asserted-by":"publisher","first-page":"699","DOI":"10.3390\/s18030699","volume":"18","author":"DT Nguyen","year":"2018","unstructured":"Nguyen, D. T., Pham, T. D., Baek, N. R., & Park, K. R. (2018). Combining deep and handcrafted image features for presentation attack detection in face recognition systems using visible-light camera sensors. Sensors, 18(3), 699.","journal-title":"Sensors"},{"key":"8186_CR60","doi-asserted-by":"crossref","unstructured":"Weitz, K., Hassan, T., Schmid, U. and Garbas, J.U., (2019) Deep-learned faces of pain and emotions Elucidating the differences of facial expressions with the help of explainable AI methods.\u00a0tm-Technisches Messen,\u00a086(7-8): 404-412.","DOI":"10.1515\/teme-2019-0024"},{"key":"8186_CR61","doi-asserted-by":"crossref","unstructured":"Williford, J.R., May, B.B. and Byrne, J., (2020) August. Explainable Face Recognition. In\u00a0European Conference on Computer Vision\u00a0(pp. 248-263). Springer, Cham.","DOI":"10.1007\/978-3-030-58621-8_15"},{"key":"8186_CR62","doi-asserted-by":"crossref","unstructured":"Wang, M. and Deng, W., 2020. Mitigating Bias in Face Recognition Using Skewness-Aware Reinforcement Learning. In\u00a0Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition\u00a0(pp. 9322-9331).","DOI":"10.1109\/CVPR42600.2020.00934"},{"key":"8186_CR63","doi-asserted-by":"crossref","unstructured":"Duong, C.N., Luu, K., Quach, K.G., Nguyen, N., Patterson, E., Bui, T.D. and Le, N., (2019). Automatic face aging in videos via deep reinforcement learning. In\u00a0Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition\u00a0(pp. 10013-10022).","DOI":"10.1109\/CVPR.2019.01025"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08186-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08186-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08186-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T12:59:05Z","timestamp":1724504345000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08186-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,16]]},"references-count":63,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["8186"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08186-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2021,2,16]]},"assertion":[{"value":"28 January 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}