{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T23:27:27Z","timestamp":1769210847170,"version":"3.49.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/icc.2019.8761480","type":"proceedings-article","created":{"date-parts":[[2019,7,16]],"date-time":"2019-07-16T00:16:31Z","timestamp":1563236191000},"page":"1-7","source":"Crossref","is-referenced-by-count":15,"title":["Learning to Authenticate with Deep Multibiometric Hashing and Neural Network Decoding"],"prefix":"10.1109","author":[{"given":"Veeru","family":"Talreja","sequence":"first","affiliation":[]},{"given":"Sobhan","family":"Soleymani","sequence":"additional","affiliation":[]},{"given":"Matthew C.","family":"Valenti","sequence":"additional","affiliation":[]},{"given":"Nasser M.","family":"Nasrabadi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2018.8646467"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.23919\/BIOSIG.2018.8553523"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2788405"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006751"},{"key":"ref14","article-title":"Learning face representation from scratch","volume":"abs 1411 7923","author":"yi","year":"2014","journal-title":"CoRR"},{"key":"ref15","year":"0","journal-title":"CASIA-Iris-Thousand"},{"key":"ref16","author":"bowyer","year":"2010","journal-title":"The ND-IRIS-0405 Iris Image Dataset"},{"key":"ref17","year":"0","journal-title":"WVU multimodal dataset"},{"key":"ref18","first-page":"1755","article-title":"Dlib-ml: A machine learning toolkit","volume":"10","author":"king","year":"2009","journal-title":"J Mach Learn Res"},{"key":"ref19","article-title":"A biometric reference system for iris (osiris)","author":"sutra","year":"2013"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2018.00097"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2008.4699352"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2815540"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2017.8308652"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8545061"},{"key":"ref7","article-title":"Rule-based feasibility decision method for big data structure fusion: Control method","volume":"17","author":"shi","year":"2016","journal-title":"Int J Simulation Syst Sci Technol"},{"key":"ref2","first-page":"1221","article-title":"Multimodal biometrics: An overview","author":"ross","year":"2004","journal-title":"Proc European Signal Processing Conference"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2016.0521"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2166545"},{"key":"ref20","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"arXiv preprint arXiv 1412 6980"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00262-5"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/83.913594"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2569061"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.12.013"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/0098-3004(93)90090-R"}],"event":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","location":"Shanghai, China","start":{"date-parts":[[2019,5,20]]},"end":{"date-parts":[[2019,5,24]]}},"container-title":["ICC 2019 - 2019 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8753818\/8761046\/08761480.pdf?arnumber=8761480","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:08:01Z","timestamp":1657854481000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8761480\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icc.2019.8761480","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}