{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:38:39Z","timestamp":1778168319327,"version":"3.51.4"},"reference-count":229,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100011665","name":"Deanship of Scientific Research, King Saud University through the Vice Deanship of Scientific Research Chairs","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3096136","type":"journal-article","created":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T19:41:43Z","timestamp":1625859703000},"page":"99112-99142","source":"Crossref","is-referenced-by-count":102,"title":["Recent Advances in Deep Learning Techniques for Face Recognition"],"prefix":"10.1109","volume":"9","author":[{"given":"Md. Tahmid Hasan","family":"Fuad","sequence":"first","affiliation":[]},{"given":"Awal Ahmed","family":"Fime","sequence":"additional","affiliation":[]},{"given":"Delowar","family":"Sikder","sequence":"additional","affiliation":[]},{"given":"Md. Akil Raihan","family":"Iftee","sequence":"additional","affiliation":[]},{"given":"Jakaria","family":"Rabbi","sequence":"additional","affiliation":[]},{"given":"Mabrook S.","family":"Al-Rakhami","sequence":"additional","affiliation":[]},{"given":"Abdu","family":"Gumaei","sequence":"additional","affiliation":[]},{"given":"Ovishake","family":"Sen","sequence":"additional","affiliation":[]},{"given":"Mohtasim","family":"Fuad","sequence":"additional","affiliation":[]},{"given":"Md. Nazrul","family":"Islam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","first-page":"1319","article-title":"Maxout networks","author":"goodfellow","year":"2013","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2996637"},{"key":"ref171","first-page":"174","article-title":"Recognition over encrypted faces","author":"chabanne","year":"2018","journal-title":"Proc Int Conf Mobile Secure Program Netw"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.10.015"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8803362"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00364"},{"key":"ref175","first-page":"738","article-title":"Orthogonal deep features decomposition for age-invariant face recognition","author":"wang","year":"2018","journal-title":"Proc Eur Conf Comput Vis (ECCV)"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.01.011"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2016.11.IMAWM-470"},{"key":"ref168","article-title":"Fast and accurate deep network learning by exponential linear units (ELUs)","author":"clevert","year":"2015","journal-title":"arXiv 1511 07289"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1145\/1111449.1111492"},{"key":"ref39","article-title":"Learning face representation from scratch","author":"yi","year":"2014","journal-title":"arXiv 1411 7923"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46478-7_31"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2017.36"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00934"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.01015"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1038\/nature14540","article-title":"Reinforcement learning improves behaviour from evaluative feedback","volume":"521","author":"littman","year":"2015","journal-title":"Nature"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.713"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.244"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2004.1421663"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.02.053"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-020-04538-y"},{"key":"ref185","first-page":"548","article-title":"Dependency-aware attention control for unconstrained face recognition with image sets","author":"liu","year":"2018","journal-title":"Proc Eur Conf Comput Vis (ECCV)"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69923-3_4"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1145\/2845089"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPAASC47483.2019.9023149"},{"key":"ref189","article-title":"Face verification and open-set identification for real-time video applications","author":"grundstr\u00f6m","year":"2015"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987385"},{"key":"ref187","first-page":"1","article-title":"Anti-makeup: Learning a bi-level adversarial network for makeup-invariant face verification","volume":"32","author":"li","year":"2018","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/SIPROCESS.2017.8124508"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.407"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638073"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.554"},{"key":"ref20","article-title":"Deep learning and face recognition: The state of the art","volume":"9457","author":"balaban","year":"2015","journal-title":"Proc SPIE"},{"key":"ref22","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2014","journal-title":"arXiv 1409 1556"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00203"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8803686"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00534"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2018.00011"},{"key":"ref50","year":"2021","journal-title":"CASIA 3D"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00547"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2017.197"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2700390"},{"key":"ref156","first-page":"1","article-title":"Large scale online learning of image similarity through ranking","volume":"11","author":"chechik","year":"2010","journal-title":"J Mach Learn Res"},{"key":"ref155","first-page":"133","article-title":"BioMetricNet: Deep unconstrained face verification through learning of metrics regularized onto Gaussian distributions","author":"ali","year":"2020","journal-title":"Proc Eur Conf Comput Vis"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00557"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994207"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00566"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00685"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00353"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00594"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2019.2936624"},{"key":"ref59","first-page":"92","article-title":"Evaluation of pooling operations in convolutional architectures for object recognition","author":"scherer","year":"2010","journal-title":"Artificial Neural Networks&#x2014;ICANN"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICEngTechnol.2017.8308186"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"4500","DOI":"10.3390\/app9214500","article-title":"A high-accuracy model average ensemble of convolutional neural networks for classification of cloud image patches on small datasets","volume":"9","author":"phung","year":"2019","journal-title":"Appl Sci"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MEES.2017.8248937"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2021.01.026"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-019-01247-4"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2019.102805"},{"key":"ref40","first-page":"87","article-title":"MS-Celeb-1M: A dataset and benchmark for large-scale face recognition","author":"guo","year":"2016","journal-title":"Proc Eur Conf Comput Vis"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"ref166","first-page":"3","article-title":"Rectifier nonlinearities improve neural network acoustic models","volume":"30","author":"maas","year":"2013","journal-title":"Proc ICML"},{"key":"ref165","first-page":"472","article-title":"Incorporating second-order functional knowledge for better option pricing","author":"dugas","year":"2001","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref164","first-page":"807","article-title":"Rectified linear units improve restricted Boltzmann machines","author":"nair","year":"2010","journal-title":"Proc ICML"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3026421"},{"key":"ref162","year":"2021","journal-title":"Softmax Function"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.428"},{"key":"ref160","article-title":"L2-constrained softmax loss for discriminative face verification","author":"ranjan","year":"2017","journal-title":"arXiv 1703 09507"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/34.41390"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/34.598235"},{"key":"ref6","first-page":"484","article-title":"Active appearance models","author":"cootes","year":"1998","journal-title":"Proc Eur Conf Comput Vis"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1992.201759"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1994.576366"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2018.2822810"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5244\/C.10.10"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/978-3-540-89991-4_6","article-title":"Bosphorus database for 3D face analysis","author":"savran","year":"2008","journal-title":"Proc Eur Workshop Biometrics Identity Manage"},{"key":"ref157","first-page":"1857","article-title":"Improved deep metric learning with multi-class n-pair loss objective","author":"sohn","year":"2016","journal-title":"Proc 30th Int Conf Neural Inf Process Syst"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383266"},{"key":"ref158","article-title":"Learning deep features via congenerous cosine loss for person recognition","author":"liu","year":"2017","journal-title":"arXiv 1702 06890"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/11527923_93"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-017-0097-2"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2010.5634497"},{"key":"ref42","first-page":"765","article-title":"The devil of face recognition is in the noise","author":"wang","year":"2018","journal-title":"Proc Eur Conf Comput Vis (ECCV)"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00020"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2833032"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00945"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.10.010"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00222"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2806291"},{"key":"ref70","first-page":"1","article-title":"Thermal to visible face recognition using deep autoencoders","author":"kantarc?","year":"2019","journal-title":"Proc Int Conf Biometrics Special Interest Group (BIOSIG)"},{"key":"ref76","first-page":"633","article-title":"A multi-scale cascade fully convolutional network face detector","author":"yang","year":"2016","journal-title":"Proc Int Conf Pattern Recognit (ICPR)"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.143"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.302"},{"key":"ref75","article-title":"Working hard to know your neighbor&#x2019;s margins: Local descriptor learning loss","author":"mishchuk","year":"2017","journal-title":"arXiv 1705 10872"},{"key":"ref78","doi-asserted-by":"crossref","first-page":"292","DOI":"10.3390\/electronics8030292","article-title":"A state-of-the-art survey on deep learning theory and architectures","volume":"8","author":"alom","year":"2019","journal-title":"Electronics"},{"key":"ref79","first-page":"203","article-title":"Theories and applications of auto-encoder neural networks: A literature survey","volume":"42","author":"yuan","year":"2019","journal-title":"Jisuanji Xuebao\/Chinese Journal of Computers"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.529"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2020.2986942"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.251"},{"key":"ref63","article-title":"Targeting ultimate accuracy: Face recognition via deep embedding","author":"liu","year":"2015","journal-title":"arXiv 1506 07310"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.180"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2018.8451494"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00835"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.404"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.20"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.41"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.527"},{"key":"ref198","article-title":"Masked face recognition dataset and application","author":"wang","year":"2020","journal-title":"arXiv 2003 09093"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2020.105677"},{"key":"ref193","article-title":"Cross-pose LFW: A database for studying cross-pose face recognition in unconstrained environments","volume":"5","author":"zheng","year":"2018"},{"key":"ref194","year":"2021","journal-title":"Challenge 3 Face feature test\/trillion pairs"},{"key":"ref195","first-page":"217","article-title":"Semi-supervised adversarial learning to generate photorealistic face images of new identities from 3D morphable model","author":"gecer","year":"2018","journal-title":"Proc Eur Conf Comput Vis (ECCV)"},{"key":"ref196","first-page":"1","article-title":"Labeled faces in the wild: A database forstudying face recognition in unconstrained environments","author":"huang","year":"2008","journal-title":"Proc Workshop Faces Real-Life Images Detection Alignment Recognition"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3017779"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2986079"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.250"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2019.103861"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2017.03.006"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.141"},{"key":"ref192","article-title":"Towards age-invariant face recognition","author":"zhao","year":"2020","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1117\/12.2558166"},{"key":"ref90","first-page":"3","article-title":"Dual-agent GANs for photorealistic and identity preserving profile face synthesis","volume":"2","author":"zhao","year":"2017","journal-title":"Proc NIPS"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2016.09.001"},{"key":"ref99","first-page":"153","article-title":"Greedy layer-wise training of deep networks","volume":"19","author":"bengio","year":"2007","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref96","year":"2021","journal-title":"Overview of GAN Structure |Generative Adversarial Networks"},{"key":"ref97","volume":"1","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01411"},{"key":"ref81","year":"2021","journal-title":"Comprehensive Introduction to Autoencoders"},{"key":"ref84","article-title":"Using deep autoencoders for facial expression recognition","author":"usman","year":"2018","journal-title":"arXiv 1801 08329"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01451"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2014.79"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272698"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01010"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2961900"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2019.2923262"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2017.8296650"},{"key":"ref200","first-page":"1","article-title":"Asymmetric joint learning for heterogeneous face recognition","volume":"32","author":"cao","year":"2018","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273523"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6247968"},{"key":"ref209","article-title":"The do&#x2019;s and don&#x2019;ts for CNN-based face verification","author":"bansal","year":"2017","journal-title":"arXiv 1705 07426"},{"key":"ref203","article-title":"Cross-spectral face completion for NIR-VIS heterogeneous face recognition","author":"he","year":"2019","journal-title":"arXiv 1902 03565"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.720"},{"key":"ref201","first-page":"1","article-title":"Coupled deep learning for heterogeneous face recognition","volume":"32","author":"wu","year":"2018","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987329"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.02.037"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2019.8756510"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.87"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00033"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791198"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712704"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2651380"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791187"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.30"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.601"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2016.04.003"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2228856"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/BIOSIG.2016.7736902"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2788002"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/ISBA.2016.7477244"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2016.7550062"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00203"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6953"},{"key":"ref228","first-page":"21","article-title":"Facial emotion recognition with noisy multi-task annotations","author":"zhang","year":"2021","journal-title":"Proc IEEE Winter Conf Appl Comput Vis (WACV)"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.076"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2015.7163156"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698596"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1145\/2964284.2964311"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00031"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2019.00032"},{"key":"ref126","first-page":"579","article-title":"Do we really need to collect millions of faces for effective face recognition?","author":"masi","year":"2016","journal-title":"Proc Eur Conf Comput Vis"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.398"},{"key":"ref124","first-page":"787","article-title":"High-fidelity pose and expression normalization for face recognition in the wild","author":"zhu","year":"2015","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit (CVPR)"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2986079"},{"key":"ref128","article-title":"Learning a metric embedding for face recognition using the multibatch method","author":"tadmor","year":"2016","journal-title":"arXiv 1605 07270"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2015.2477042"},{"key":"ref133","first-page":"7","article-title":"Large-margin softmax loss for convolutional neural networks","volume":"2","author":"liu","year":"2016","journal-title":"Proc ICML"},{"key":"ref134","article-title":"Deep learning face representation by joint identification-verification","author":"sun","year":"2014","journal-title":"arXiv 1406 4773"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.529"},{"key":"ref132","first-page":"3811","article-title":"Surpassing human-level face verification performance on LFW with Gaussianface","volume":"29","author":"lu","year":"2015","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/CICT48419.2019.9066169"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1145\/3123266.3123359"},{"key":"ref138","article-title":"Naive-deep face recognition: Touching the limit of LFW benchmark or not?","author":"zhou","year":"2015","journal-title":"arXiv 1501 04690"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298907"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.578"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.23919\/ChiCC.2019.8866028"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00123"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01222"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00552"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/5.381842"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS46853.2019.9185981"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.1991.3.1.71"},{"key":"ref145","first-page":"628","article-title":"Pairwise relational networks for face recognition","author":"kang","year":"2018","journal-title":"Proc Eur Conf Comput Vis (ECCV)"},{"key":"ref109","doi-asserted-by":"crossref","first-page":"1635","DOI":"10.1109\/TIP.2010.2042645","article-title":"Enhanced local texture feature sets for face recognition under difficult lighting conditions","volume":"19","author":"tan","year":"2010","journal-title":"IEEE Trans Image Process"},{"key":"ref108","year":"2021","journal-title":"Fasseg"},{"key":"ref107","author":"belitskaya","year":"2021","journal-title":"Yale Face Database"},{"key":"ref106","year":"2021"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2018.06.004"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.22266\/ijies2020.1031.03"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2017.8393043"},{"key":"ref102","first-page":"1","article-title":"Learning a Mahalanobis metric from equivalence constraints","volume":"6","author":"bar-hillel","year":"2005","journal-title":"J Mach Learn Res"},{"key":"ref111","author":"yang","year":"2010","journal-title":"Nature-Inspired Metaheuristic Algorithms"},{"key":"ref112","year":"2021","journal-title":"Cbcl face database"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126542"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-1904-8_8"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1274","DOI":"10.1109\/TPAMI.2006.172","article-title":"Subclass discriminant analysis","volume":"28","author":"zhu","year":"2006","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2462338"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1108\/eb007637"},{"key":"ref15","first-page":"88","article-title":"Face recognition: A literature review","volume":"2","author":"tolba","year":"2006","journal-title":"Int J Signal Process"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICETECT.2011.5760234"},{"key":"ref118","article-title":"DeepID3: Face recognition with very deep neural networks","author":"sun","year":"2015","journal-title":"arXiv 1502 00873"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TENCONSpring.2014.6863118"},{"key":"ref117","article-title":"Improving heterogeneous face recognition with conditional adversarial networks","author":"zhang","year":"2017","journal-title":"arXiv 1709 02848"},{"key":"ref18","article-title":"Deep learning for face recognition: A critical analysis","author":"shepley","year":"2019","journal-title":"arXiv 1907 12739"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25958-1_8"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.424"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.188"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/SPIN48934.2020.9070853"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996299"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2344667"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00078"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01025"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2938418"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1142\/S0219467806002379"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09478893.pdf?arnumber=9478893","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T19:51:24Z","timestamp":1643226684000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9478893\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":229,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3096136","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}