{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T15:27:34Z","timestamp":1773847654208,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100014716","name":"U.S. Army Combat Capabilities Development Command (CCDC) Army Research Laboratory (ARL)","doi-asserted-by":"publisher","award":["W911QX-17-D-0015"],"award-info":[{"award-number":["W911QX-17-D-0015"]}],"id":[{"id":"10.13039\/100014716","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,28]]},"DOI":"10.1109\/ijcb48548.2020.9304937","type":"proceedings-article","created":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T16:58:35Z","timestamp":1610038715000},"page":"1-9","source":"Crossref","is-referenced-by-count":18,"title":["Cross-Domain Identification for Thermal-to-Visible Face Recognition"],"prefix":"10.1109","author":[{"given":"Cedric Nimpa","family":"Fondje","sequence":"first","affiliation":[]},{"given":"Shuowen","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Nathaniel J.","family":"Short","sequence":"additional","affiliation":[]},{"given":"Benjamin S.","family":"Riggan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.30"},{"key":"ref11","article-title":"Labeled faces in the wild: A database for studying face recognition in unconstrained environments","author":"huang","year":"2007","journal-title":"University of Massachusetts Amherst"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00034"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987416"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.527"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.374"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2013.59"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.363"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_55"},{"key":"ref4","article-title":"Department of Defense (DOD) Automated Biometric Identification System (ABIS) version 1.2","author":"gilmore","year":"2015","journal-title":"Operational Test & Evaluation (OT&E)"},{"key":"ref27","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"0","journal-title":"International Conference on Learning Representations"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1117\/12.920330"},{"key":"ref6","first-page":"2672","article-title":"Generative adversarial nets","volume":"2","author":"goodfellow","year":"2014","journal-title":"Proceedings of the 27th International Conference on Neural Information Processing Systems -"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-019-01175-3"},{"key":"ref5","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1364\/OL.39.003857"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2005.03.001"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.32.000431"},{"key":"ref1","article-title":"BEGAN: Boundary equilibrium generative adversarial networks","author":"berthelot","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2479620"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEW.2018.8551516"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2016.7477447"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2814042"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1364\/OL.40.000882"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-016-0933-2"}],"event":{"name":"2020 IEEE International Joint Conference on Biometrics (IJCB)","location":"Houston, TX, USA","start":{"date-parts":[[2020,9,28]]},"end":{"date-parts":[[2020,10,1]]}},"container-title":["2020 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9304574\/9304852\/09304937.pdf?arnumber=9304937","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:56:20Z","timestamp":1656453380000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9304937\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ijcb48548.2020.9304937","relation":{},"subject":[],"published":{"date-parts":[[2020,9,28]]}}}