{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:03:33Z","timestamp":1761663813557,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/cec.2018.8477817","type":"proceedings-article","created":{"date-parts":[[2018,11,12]],"date-time":"2018-11-12T08:12:42Z","timestamp":1542010362000},"page":"1-8","source":"Crossref","is-referenced-by-count":28,"title":["Multimodal Feature Level Fusion based on Particle Swarm Optimization with Deep Transfer Learning"],"prefix":"10.1109","author":[{"given":"Pedro H.","family":"Silva","sequence":"first","affiliation":[]},{"given":"Eduardo","family":"Luz","sequence":"additional","affiliation":[]},{"given":"Luiz A.","family":"Zanlorensi","sequence":"additional","affiliation":[]},{"given":"David","family":"Menotti","sequence":"additional","affiliation":[]},{"given":"Gladston","family":"Moreira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995566"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2011.08.014"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2807412"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2007.03.019"},{"key":"ref35","first-page":"3320","article-title":"How transferable are features in deep neural networks?","author":"yosinski","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2010.5634504"},{"journal-title":"Deep Learning","year":"2016","author":"goodfellow","key":"ref10"},{"key":"ref11","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref12","first-page":"1","article-title":"Identifying useful features for recognition in near-infrared periocular images","author":"hollingsworth","year":"2010","journal-title":"Biometrics Theory Applications and Systems (BTAS) 2010 Fourth IEEE International Conference on"},{"key":"ref13","article-title":"Labeled faces in the wild: A database for studying face recognition in unconstrained environments","author":"huang","year":"2007","journal-title":"Tech Rep"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117600"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"4104","DOI":"10.1109\/ICSMC.1997.637339","article-title":"A discrete binary version of the particle swarm algorithm","volume":"5","author":"kennedy","year":"1997","journal-title":"Systems Man and Cybernetics 1997 Computational Cybernetics and Simulation 1997 IEEE International Conference on"},{"key":"ref16","article-title":"An x-ray on methods aiming at arrhthmia classification in ecg signals","author":"luz","year":"2011","journal-title":"International Conference on Bioinformatics and Computational Biology (BIOCOMP'2011)"},{"key":"ref17","article-title":"Deep periocular representation aiming video surveillance","author":"luz","year":"2017","journal-title":"Pattern Recognition Letters"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.222"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2009.5339068"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2014.2337714"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2011.11.006"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2260165"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.08.005"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/34.244676"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2011.08.009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.903540"},{"key":"ref8","first-page":"647","article-title":"Decaf: A deep convolutional activation feature for generic visual recognition","volume":"32","author":"donahue","year":"2014","journal-title":"ICML"},{"key":"ref7","first-page":"223","article-title":"A proposed standard for biometric decidability","author":"daugman","year":"1996","journal-title":"Proc CardTech\/SecureTech Conf"},{"key":"ref2","first-page":"1","article-title":"Periocular biometrics: When iris recognition fails","author":"bharadwaj","year":"2010","journal-title":"Biometrics Theory Applications and Systems (BTAS) 2010 Fourth IEEE International Conference on"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2818346.2823313"},{"key":"ref1","article-title":"Combining multiple iris texture features for unconstrained recognition in visible wavelengths","author":"andersen-hoppe","year":"2017","journal-title":"IEEE International Workshop on Biometrics and Forensics (IWBF)"},{"key":"ref20","first-page":"6","article-title":"Deep face recognition","volume":"1","author":"parkhi","year":"2015","journal-title":"British Machine Vision Conference"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.66"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2177659"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2011.08.017"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1109\/TIFS.2017.2771230","article-title":"Deep-prwis: Periocular recognition without the iris and sclera using deep learning frameworks","volume":"13","author":"proen\u00e7a","year":"2018","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/CEC.2001.934374","article-title":"Particle swarm optimization: developments, applications and resources","volume":"1","author":"shi","year":"2001","journal-title":"Evolutionary Computation 2001 Proceedings of the 2001 Congress on"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"}],"event":{"name":"2018 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2018,7,8]]},"location":"Rio de Janeiro","end":{"date-parts":[[2018,7,13]]}},"container-title":["2018 IEEE Congress on Evolutionary Computation (CEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8466244\/8477640\/08477817.pdf?arnumber=8477817","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T20:21:52Z","timestamp":1598214112000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8477817\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/cec.2018.8477817","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}