{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:00:47Z","timestamp":1773511247800,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/icccs49078.2020.9118594","type":"proceedings-article","created":{"date-parts":[[2020,6,16]],"date-time":"2020-06-16T17:44:02Z","timestamp":1592329442000},"page":"413-418","source":"Crossref","is-referenced-by-count":10,"title":["Deep Index-of-Maximum Hashing for Face Template Protection"],"prefix":"10.1109","author":[{"given":"Jiandong","family":"Cui","sequence":"first","affiliation":[]},{"given":"Andrew Beng Jin","family":"Teoh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5956-y"},{"key":"ref11","first-page":"iii-1319","article-title":"Maxout networks","volume":"28","author":"goodfellow","year":"2013","journal-title":"13th International Conference on International Conference on Machine Learning"},{"key":"ref12","article-title":"Zero-Shot Deep Hashing and Neural Network Based Error Correction for Face Template Protection","author":"talreja","year":"0","journal-title":"BTAS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2019.8662094"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2018.5156"},{"key":"ref15","first-page":"389","article-title":"ArcFace: Additive Aneular Marein Loss for Deep Face Recoenition","author":"dene","year":"2018","journal-title":"Comp Vision and Pattern Rec"},{"key":"ref16","first-page":"770","article-title":"Deep Residual Learnine for Imaee Recoenition","author":"he","year":"2016","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref17","first-page":"359","article-title":"Supervised Max Hashing for similarity Imaee Retrieval","author":"kobaisi","year":"2018","journal-title":"International Conference on Machine Learning and Applications IEEE"},{"key":"ref18","first-page":"3457","article-title":"Deep Quantization Network for Efficient Imaee Retrieval","author":"cao","year":"2016","journal-title":"Proc of the Thirtieth AAAI Conference on Artificial Intelligence"},{"key":"ref19","article-title":"Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments","author":"huang","year":"0","journal-title":"presented at the Workshop on Faces in &#x201C;Real-Life&#x201D; Imaees Detection Alienment and Recoenition"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7899771"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2014.767"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2011-3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SCIS-ISIS.2016.0082"},{"key":"ref8","first-page":"378","article-title":"A Cancellable Ranking based Hashing Method for Fingerprint Template Protection","author":"jin","year":"2017","journal-title":"International Conf on Mobile Networks and Management"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2535120"},{"key":"ref2","first-page":"1","article-title":"Sienificant Feature Based Representation for Template Protection","author":"dayal mohan","year":"0","journal-title":"presented at the Proceedines of the IEEE Conference on Computer Vision and Pattern Recognition Workshops"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2753172"}],"event":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","location":"Shanghai, China","start":{"date-parts":[[2020,5,15]]},"end":{"date-parts":[[2020,5,18]]}},"container-title":["2020 5th International Conference on Computer and Communication Systems (ICCCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9114888\/9118408\/09118594.pdf?arnumber=9118594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T20:08:32Z","timestamp":1656360512000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9118594\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icccs49078.2020.9118594","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}