{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T11:04:05Z","timestamp":1766747045216,"version":"3.48.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T00:00:00Z","timestamp":1766707200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T00:00:00Z","timestamp":1766707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04604-y","type":"journal-article","created":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T10:59:19Z","timestamp":1766746759000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Face Recognition Based on Deep Learning Convolutional Neural Network in Cloud Internet of Things Environment"],"prefix":"10.1007","volume":"7","author":[{"given":"Yaser","family":"Ghahremani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0478-6317","authenticated-orcid":false,"given":"Vafa","family":"Maihami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,26]]},"reference":[{"key":"4604_CR1","unstructured":"Shelby Z, Zissis D, Kavaklioglu C. The rise of the internet of things: A survey of enabling Technologies, Challenges, and applications. IEEE Communications Surveys & Tutorials; 2022."},{"key":"4604_CR2","unstructured":"Buyya R, Vahid A, Dastjerdi, editors. Internet of things: principles and paradigms. Elsevier; 2016. pp. 91\u20132."},{"key":"4604_CR3","unstructured":"Razzaq MA, Imran M, Khan MA, Abid SH, Qureshi A. Security and Privacy in the Internet of Things: Challenges and Solutions, IEEE Access, 2023."},{"issue":"1","key":"4604_CR4","doi-asserted-by":"publisher","first-page":"541e564","DOI":"10.1007\/s11277-019-06872-3","volume":"111","author":"ZA Almusaylim","year":"2020","unstructured":"Almusaylim ZA, Jhanjhi NZ. Comprehensive review: privacy protection of user in location-aware services of mobile cloud computing. Wirel Pers Commun. 2020;111(1):541e564.","journal-title":"Wirel Pers Commun"},{"key":"4604_CR5","unstructured":"Rama Moorthy H, Vijeth, Upadhya, Vidyesh V, Holla. CNN based smart surveillance system: a Smart IoT application post covid-19 Era, IEEE 2020 Xplore Part Number:CFP20OSV-ART; ISBN: 978-1-7281-5464-0."},{"issue":"4","key":"4604_CR6","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MCOM.2018.1700790","volume":"56","author":"G Muhammad","year":"2018","unstructured":"Muhammad G, Alhamid MF, Alsulaiman M, Gupta B. Edge computing with cloud for voice disorders assessment and treatment. IEEE Commun Mag. 2018;56(4):60\u20135.","journal-title":"IEEE Commun Mag"},{"key":"4604_CR7","doi-asserted-by":"crossref","unstructured":"Wang J et al. A software defined network routing in wireless multihop network, J. Netw. Comput. Appl. 85 (2017) (2017) 76\u201383.","DOI":"10.1016\/j.jnca.2016.12.007"},{"issue":"3","key":"4604_CR8","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MNET.2019.1800344","volume":"33","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, et al. Edge intelligence in the cognitive internet of things: improving sensitivity and interactivity. IEEE Netw. 2019;33(3):58\u201364.","journal-title":"IEEE Netw"},{"key":"4604_CR9","unstructured":"Ingon Chanpornpakdi and Toshihisa Tanaka, Senior Member IEEE. The role of the eyes: investigating face cognition mechanisms using machine learning and partial face stimuli. IEEE Received 21 May 2023, accepted 2 July 2023, date of publication 13 July 2023, date of current version 17 August 2023."},{"key":"4604_CR10","doi-asserted-by":"crossref","first-page":"174922","DOI":"10.1109\/ACCESS.2020.3023782","volume":"8","author":"R Xie","year":"2020","unstructured":"Xie R, Yang E, Zhang Q, Zhu Q. A method of small face detection based on CNN. IEEE Access. 2020;8:174922\u201330.","journal-title":"IEEE Access"},{"key":"4604_CR11","unstructured":"Li Mao, Fusheng Sheng, and Tao Zhang. Face Occlusion Recognition With Deep Learning in Security Framework for the IoT, IEEE Received November 12, 2019, accepted November 27, 2019, date of publication December 2, 2019, date of current version December 16, 2019.[14]."},{"key":"4604_CR12","unstructured":"SHI LUO XIONGFEILI, Member IEEE, XIAOLI ZHANG. RUI ZHU, AND. SFA: Small Faces Attention Face Detector, IEEE Received October 29, 2019, accepted November 19, 2019, date of publication November 25, 2019, date of current version December 11, 2019."},{"key":"4604_CR13","doi-asserted-by":"publisher","first-page":"174531","DOI":"10.1109\/ACCESS.2019.2956980","volume":"7","author":"L Mao","year":"2019","unstructured":"Mao L, Sheng F, Zhang T. Face occlusion recognition with deep learning in security framework for the IoT. IEEE Access. 2019;7:174531\u201340. https:\/\/doi.org\/10.1109\/ACCESS.2019.2956980.","journal-title":"IEEE Access"},{"key":"4604_CR14","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.comcom.2020.01.050","volume":"152","author":"Mehedi Masud","year":"2020","unstructured":"Masud Mehedi, Muhammad Ghulam, Alhumyani Hesham, Alshamrani Sultan S, Cheikhrouhou Omar, Ibrahim Saleh, et al. Deep learning-based intelligent face recognition in IoT-cloud environment. Comput Commun. 2020;152:215\u201322.","journal-title":"Comput Commun"},{"key":"4604_CR15","doi-asserted-by":"crossref","unstructured":"Micha\u0142 Wieczorek J, Si\u0142ka MW, Garg S, Member IEEE. and Mohammad Mehedi Hassan. Lightweight Convolutional Neural Network Model for Human Face Detection in Risk Situations, IEEE Transactions on Industrial Informatics, Vol. 18, No. 7, JULY 2022[13].","DOI":"10.1109\/TII.2021.3129629"},{"issue":"24","key":"4604_CR16","doi-asserted-by":"publisher","first-page":"21457","DOI":"10.1109\/JIOT.2023.3299465","volume":"10","author":"S Umer","year":"2023","unstructured":"Umer S, Sardar A, Rout RK, Tanveer M, Razzak I. IoT-enabled multimodal biometric recognition system in secure environment. IEEE Internet Things J. 2023;10(24):21457\u201366. https:\/\/doi.org\/10.1109\/JIOT.2023.3299465.","journal-title":"IEEE Internet Things J"},{"issue":"13","key":"4604_CR17","doi-asserted-by":"publisher","first-page":"23196","DOI":"10.1109\/JIOT.2024.3374229","volume":"11","author":"A Sardar","year":"2024","unstructured":"Sardar A, Umer S, Rout RK, Sahoo KS, Gandomi AH. Enhanced biometric template protection schemes for securing face recognition in IoT environment. IEEE Internet Things J. 2024;11(13):23196\u2013206. https:\/\/doi.org\/10.1109\/JIOT.2024.3374229.","journal-title":"IEEE Internet Things J"},{"key":"4604_CR18","doi-asserted-by":"publisher","first-page":"22767","DOI":"10.1109\/ACCESS.2023.3253024","volume":"11","author":"M Rukhiran","year":"2023","unstructured":"Rukhiran M, Wong-In S, Netinant P. IoT-based biometric recognition systems in education for identity verification services: quality assessment approach. IEEE Access. 2023;11:22767\u201387. https:\/\/doi.org\/10.1109\/ACCESS.2023.3253024.","journal-title":"IEEE Access"},{"issue":"15","key":"4604_CR19","doi-asserted-by":"publisher","first-page":"25720","DOI":"10.1109\/JIOT.2024.3383673","volume":"11","author":"J Xu","year":"2024","unstructured":"Xu J, Lin W, Fan W, Chen J, Li K, Liu X, Xu G, Yi S, Gan J. A graph neural network model for live face Anti-Spoofing detection camera systems. IEEE Internet Things J. 2024;11(15):25720\u201330. https:\/\/doi.org\/10.1109\/JIOT.2024.3383673.","journal-title":"IEEE Internet Things J"},{"key":"4604_CR20","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2024.048238","author":"D Gura","year":"2024","unstructured":"Gura D, Dong B, Mehiar D, Al Said N. Customized convolutional neural network for accurate detection of deep fake images in video collections. Comput Mater Contin. 2024. https:\/\/doi.org\/10.32604\/cmc.2024.048238.","journal-title":"Comput Mater Contin"},{"key":"4604_CR21","doi-asserted-by":"crossref","unstructured":"Rajeshwari J, Shankar J, Shalini KB, Meghana S. Convolutional neural network based infant face recognition system. Innovations Cybersecur Data Sci, 2024.","DOI":"10.1007\/978-981-97-5791-6_38"},{"key":"4604_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-023-02573-4","author":"H Huang","year":"2023","unstructured":"Huang H, Zhang Y, Si Y, Wang J. Two-branch 3D convolution neural network for gait recognition. Signal Image Video Process. 2023. https:\/\/doi.org\/10.1007\/s11760-023-02573-4.","journal-title":"Signal Image Video Process"},{"key":"4604_CR23","unstructured":"Hasan Abdullah T, Alizadeh F. Patch-Wise partial face recognition using convolutional neural network. Optical Memory and Neural Networks; 2022."},{"key":"4604_CR24","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.future.2019.06.010","volume":"101","author":"AA Amory","year":"2019","unstructured":"Amory AA, Muhammad G, Mathkour H. Deep convolutional tree networks. Future Gener Comput Syst. 2019;101:152\u201368.","journal-title":"Future Gener Comput Syst"},{"key":"4604_CR25","unstructured":"Atta A, Abbas S, Khan MA, Ahmed G, Farooq U. An adaptive approach: smart traffic congestion control system. Journal of King Saud University -Computer and Information Sciences; 2018."},{"key":"4604_CR26","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1016\/j.future.2018.08.040","volume":"91","author":"A Yassine","year":"2019","unstructured":"Yassine A, et al. IoT big data analytics for smart homes with fog and cloud computing. Future Gener Comput Syst. 2019;91:563\u201373.","journal-title":"Future Gener Comput Syst"},{"key":"4604_CR27","unstructured":"Dmitry G, Zissis D, Kavaklioglu C. The rise of the internet of things: a survey of enabling Technologies, Challenges, and applications. IEEE Communications Surveys & Tutorials; 2022."},{"key":"4604_CR28","doi-asserted-by":"publisher","unstructured":"Garg B, Bhardwaj A, Jain T. (2024). Detection of Hate Speech and Offensive Language Using Machine Learning and Deep Learning for Multi-Class Tweets. 2024 IEEE International Conference on Smart Power Control and Renewable Energy, ICSPCRE 2024. https:\/\/doi.org\/10.1109\/ICSPCRE62303.2024.10675191","DOI":"10.1109\/ICSPCRE62303.2024.10675191"},{"key":"4604_CR29","unstructured":"Mohammed Sa, * S, Awadalla PaM. Development of an IoT based real-time traffic monitoring system for City governance. 2589\u20137918\/\u00a9 2020 the Authors. Production and hosting by Elsevier B.V. On behalf of KeAi. Communications Co., Ltd. This is an open access article under the CC BY-NC-ND; 2020."},{"key":"4604_CR30","unstructured":"Usman, Qamar. Evolutionary testing using particle swarm optimization in IOT applications, SAI Intelligent Systems Conference 2016 September 21\u201322, 2016 | London, UK."},{"key":"4604_CR31","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J. Deep residual learning for image recognition, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016, pp. 770\u2013778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"4604_CR32","volume":"137","author":"Jiayi Chen","year":"2024","unstructured":"Chen Jiayi, Hengartner Urs, Khan Hassan. SHRIMPS: a framework for evaluating multi-user, multi-modal implicit authentication systems,. ournal homepage: www.elsevier.com\/locate\/cose, Computers & Security. 2024;137:103594.","journal-title":"ournal homepage: www.elsevier.com\/locate\/cose, Computers & Security"},{"key":"4604_CR33","unstructured":"Manisha Malik, Kamaldeep, Maitreyee Dutta, and Jorge Granjal, Member IEEE. L-ECQV: lightweight ECQV implicit certificates for authentication in the internet of things. IEEE \/ACCESS2023.3261666, Received 4 February 2023, accepted 15 March 2023, date of publication 24 March 2023, date of current version 13 April 2023."},{"key":"4604_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100927","volume":"24","author":"DipenR Bhuva","year":"2023","unstructured":"Bhuva Dipen R, Kumar Sathish. A novel continuous authentication method using biometrics for IOT devices,. Internet Things. 2023;24:100927.","journal-title":"Internet Things"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04604-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04604-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04604-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T10:59:22Z","timestamp":1766746762000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04604-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,26]]},"references-count":34,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,1]]}},"alternative-id":["4604"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04604-y","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,26]]},"assertion":[{"value":"31 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or nonfinancial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human or animal subjects performed by any of the authors. This study exclusively utilized publicly available data, which have been appropriately cited.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"48"}}