{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:55:11Z","timestamp":1730199311470,"version":"3.28.0"},"reference-count":53,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1109\/atsip49331.2020.9231835","type":"proceedings-article","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T17:54:30Z","timestamp":1603302870000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Demographic Face Profiling Based on Age, Gender and Race"],"prefix":"10.1109","author":[{"given":"Asma El Kissi","family":"Ghalleb","sequence":"first","affiliation":[]},{"given":"Safa","family":"Boumaiza","sequence":"additional","affiliation":[]},{"given":"Najoua Essoukri Ben","family":"Amara","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMI.2017.8265815"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14738\/aivp.75.7208"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2362759"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-015-0089-y"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2738004"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"1942","DOI":"10.1109\/ICNN.1995.488968","article-title":"Particle swarm optimization","volume":"4","author":"eberhart","year":"1995","journal-title":"IEEE International Conference on Neural Networks"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017623"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/11744023_32"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-018-0278-6"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10599-4_49"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2019.03.025"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2889180"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2018.0670"},{"year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159691"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2669035"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5980-y"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2019.101052"},{"key":"ref26","article-title":"Age from faces in the deep learning revolution","author":"carletti","year":"2019","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26972-2"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.599"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-016-0940-3"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112942"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00245"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3344255"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2480381"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/492"},{"key":"ref12","first-page":"404","article-title":"Facial Recognition in Degraded Conditions Using Local Interest Points","author":"ouannes nasr","year":"2020","journal-title":"International Multi-Conference on Systems, Sygnals &amp; Devices"},{"key":"ref13","first-page":"22","article-title":"Biometric authentication based on multi-instance fingerprint fusion in degraded context","author":"rzouga haddada","year":"2019","journal-title":"International Multi-Conference on Systems, Sygnals &amp; Devices"},{"key":"ref14","first-page":"486","article-title":"Remote person authentication in different scenarios based on gait and face in front view","author":"el kissi ghalleb","year":"2017","journal-title":"International Multi-Conference on Systems, Sygnals &amp; Devices"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IPAS.2014.7043304"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-019-09689-5"},{"key":"ref17","article-title":"Machine Decisions and Human Consequences","author":"scantamburlo","year":"2018","journal-title":"arXiv preprint arXiv 1811 06747"},{"journal-title":"Development of the California Static Risk Assessment (CSRA) Recidivism risk prediction in the California department of corrections and rehabilitation","year":"2013","author":"turner","key":"ref18"},{"key":"ref19","article-title":"COMPAS risk scales: Demonstrating accuracy equity and predictive parity","author":"dieterich","year":"2016","journal-title":"Northpointe Inc"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0180-9"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2294917"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.06.012"},{"key":"ref5","first-page":"265","article-title":"Social Media Power and Election Legitimacy","author":"tambini","year":"0","journal-title":"Digital dominance the power of Google Amazon Facebook and Apple"},{"key":"ref8","article-title":"Efficacit&#x00E9; du profilage dans le contexte de la s&#x00E9;curit&#x00E9; nationale","author":"bourque","year":"2009","journal-title":"Commission Canadienne des droits de la personne\/Fondation canadienne des relations raciales"},{"key":"ref7","first-page":"50","article-title":"Digital scene of crime: Technique of profiling users","volume":"3","author":"colombini","year":"2012","journal-title":"JoWUA"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-018-0991-2"},{"year":"0","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995437"},{"year":"0","key":"ref45"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2015.77"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.319"},{"key":"ref42","article-title":"A benchmark terrorist face recognition database","author":"el kissi ghalleb","year":"2020","journal-title":"Accepted in IEEE International Conference on Cyberworlds"},{"year":"0","key":"ref41"},{"year":"0","key":"ref44"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45243-0_39"}],"event":{"name":"2020 5th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP)","start":{"date-parts":[[2020,9,2]]},"location":"Sousse, Tunisia","end":{"date-parts":[[2020,9,5]]}},"container-title":["2020 5th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9224548\/9231527\/09231835.pdf?arnumber=9231835","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:57:58Z","timestamp":1656345478000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9231835\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/atsip49331.2020.9231835","relation":{},"subject":[],"published":{"date-parts":[[2020,9]]}}}