{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T05:15:57Z","timestamp":1771305357693,"version":"3.50.1"},"reference-count":63,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2129173"],"award-info":[{"award-number":["2129173"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Defense University Research Instrumentation Program (DURIP) from the Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["13106715"],"award-info":[{"award-number":["13106715"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3265357","type":"journal-article","created":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T17:40:07Z","timestamp":1680802807000},"page":"36550-36565","source":"Crossref","is-referenced-by-count":11,"title":["Benchmarking Neural Network Compression Techniques for Ocular-Based User Authentication on Smartphones"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0649-1229","authenticated-orcid":false,"given":"Ali","family":"Almadan","sequence":"first","affiliation":[{"name":"School of Computing, Wichita State University, Wichita, KS, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1541-8202","authenticated-orcid":false,"given":"Ajita","family":"Rattani","sequence":"additional","affiliation":[{"name":"School of Computing, Wichita State University, Wichita, KS, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.06.003"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2018.8574156"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.02.009"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF50991.2021.9465079"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA51294.2020.00168"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2020.103996"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2016.11.019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2020.103979"},{"key":"ref9","first-page":"1","article-title":"Soft-biometrics estimation in the era of facial masks","volume-title":"Proc. Int. Conf. BIOSIG","author":"Alonso-Fernandez"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1049\/bme2.12046"},{"key":"ref11","article-title":"Mobile biometrics in financial services: A five factor framework","author":"Lovisotto","year":"2017"},{"issue":"10","key":"ref12","first-page":"83","article-title":"Use of biometrics in mobile banking security: Case study of Croatian banks","volume":"19","author":"Avdi\u0107","year":"2019","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13514-7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.30630\/joiv.6.2-2.1091"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00039"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68793-9_16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2016.7568948"},{"key":"ref18","volume-title":"Eyeverify Technology Uses Smartphone Cameras to Easily Verify ID by Eye Veins","author":"Hamilton","year":"2015"},{"key":"ref19","article-title":"Face ID vs iris scanner: Is iPhone X more secure than Galaxy S8","author":"Maity","year":"2017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2771230"},{"key":"ref21","first-page":"1","article-title":"VISOB 2.0\u2014Second international competition on mobile ocular biometric recognition","volume-title":"Proc. IAPR ICPR","author":"Nguyen"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272767"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987299"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s21041434"},{"key":"ref25","article-title":"UFPR-periocular: A periocular dataset collected by mobile devices in unconstrained scenarios","volume-title":"arXiv:2011.12427","author":"Zanlorensi","year":"2020"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-22811-y"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532371"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI50451.2021.9660033"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2921977"},{"key":"ref30","first-page":"129","article-title":"What is the state of neural network pruning?","volume":"2","author":"Blalock","year":"2020","journal-title":"Proc. Mach. Learn. Syst."},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2970550"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3469029"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100303"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1503.02531"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.39.6600"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/72.80236"},{"key":"ref37","article-title":"Neural networks with few multiplications","volume-title":"arXiv:1510.03009","author":"Lin","year":"2015"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00286"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00409"},{"issue":"2","key":"ref40","first-page":"5","article-title":"Probabilistic knowledge transfer for deep representation learning","volume":"abs\/1803.10837","author":"Passalis","year":"2018","journal-title":"CoRR"},{"key":"ref41","article-title":"Rethinking the smaller-norm-less-informative assumption in channel pruning of convolution layers","volume-title":"arXiv:1802.00124","author":"Ye","year":"2018"},{"key":"ref42","article-title":"A survey of quantization methods for efficient neural network inference","volume-title":"arXiv:2103.13630","author":"Gholami","year":"2021"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/EMC2-NIPS53020.2019.00016"},{"key":"ref44","first-page":"1","article-title":"Compact models for periocular verification through knowledge distillation","volume-title":"Proc. Int. Conf. Biometrics Special Interest Group (BIOSIG)","author":"Boutros"},{"key":"ref45","article-title":"Very deep convolutional networks for large-scale image recognition","volume-title":"arXiv:1409.1556","author":"Simonyan","year":"2014"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3390\/s22051921"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.155"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3007787.3001163"},{"key":"ref50","first-page":"1","article-title":"Discrimination-aware channel pruning for deep neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"31","author":"Zhuang"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-021-01453-z"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-1991"},{"key":"ref53","first-page":"7948","article-title":"Post training 4-bit quantization of convolutional networks for rapid-deployment","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Ron"},{"key":"ref54","article-title":"QDrop: Randomly dropping quantization for extremely low-bit post-training quantization","volume-title":"arXiv:2203.05740","author":"Wei","year":"2022"},{"key":"ref55","article-title":"Improving post training neural quantization: Layer-wise calibration and integer programming","volume-title":"arXiv:2006.10518","author":"Hubara","year":"2020"},{"key":"ref56","article-title":"Integer quantization for deep learning inference: Principles and empirical evaluation","volume-title":"arXiv:2004.09602","author":"Wu","year":"2020"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.713"},{"key":"ref58","article-title":"Using Python for model inference in deep learning","volume-title":"arXiv:2104.00254","author":"DeVito","year":"2021"},{"key":"ref59","volume-title":"Apple Developer Documentation","year":"2023"},{"key":"ref60","volume-title":"Apple Developer Documentation","year":"2023"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00153"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2018.00221"},{"key":"ref63","article-title":"Network pruning that matters: A case study on retraining variants","volume-title":"arXiv:2105.03193","author":"Le","year":"2021"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6287639\/10005208\/10093861-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10093861.pdf?arnumber=10093861","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T22:05:51Z","timestamp":1709244351000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10093861\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":63,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3265357","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}