{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T02:43:46Z","timestamp":1747104226782,"version":"3.28.0"},"reference-count":56,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/ijcnn48605.2020.9207385","type":"proceedings-article","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T20:40:33Z","timestamp":1601412033000},"page":"1-8","source":"Crossref","is-referenced-by-count":7,"title":["Cognitive Identity Management: Synthetic Data, Risk and Trust"],"prefix":"10.1109","author":[{"given":"S.","family":"Yanushkevich","sequence":"first","affiliation":[]},{"given":"A.","family":"Stoica","sequence":"additional","affiliation":[]},{"given":"P.","family":"Shmerko","sequence":"additional","affiliation":[]},{"given":"W.","family":"Howells","sequence":"additional","affiliation":[]},{"given":"K.","family":"Crockett","sequence":"additional","affiliation":[]},{"given":"R.","family":"Guest","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398812"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.12.026"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.25.4.043023"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2357757"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-018-1082-6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2010-00120-8"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1214\/09-SS057"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3241036"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2018.1467059"},{"journal-title":"Security and privacy controls for information systems and organizations","year":"2017","key":"ref34"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2933241"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272756"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2016.2627668"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3110046"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-530-7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2013.0065"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MMM.2011.2174125"},{"key":"ref21","first-page":"424","article-title":"Investigating causal relations by econometric models and cross-spectral methods","author":"granger","year":"1969","journal-title":"Journal of Socio-Economics"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2018.2874188"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511818363"},{"journal-title":"Implementation Guide","article-title":"Automated Border Control","year":"2015","key":"ref26"},{"journal-title":"Executive Summary","article-title":"Checkpoint of the future","year":"2014","key":"ref25"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2517881.2517890"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2007.353421"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2629530"},{"journal-title":"Fundamentals of Biometric System Design","year":"2020","author":"yanushkevich","key":"ref55"},{"key":"ref54","article-title":"Inverse Biometrics: Privacy, Risks, and Trust","author":"yanushkevich","year":"2020","journal-title":"Encyclopedia of Cryptography Security and Privacy"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CogMI48466.2019.00014"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.002"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2765202"},{"journal-title":"H2020 Intelligent SMART Border Control (iBorderCtrl)","year":"0","key":"ref11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.54"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11009-3_35"},{"key":"ref13","article-title":"Technical Study on Smart Borders","volume":"b 1049","year":"2014","journal-title":"Eurostat European Commission"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.02.036"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2343981"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/10920277.1998.10595667"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2016.0192"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2014.10.034"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101700"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/0470012382"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2006.876720"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.tre.2013.09.005"},{"key":"ref5","first-page":"1","article-title":"Privacy and Synthetic Datasets","volume":"22","author":"bellovin","year":"2019","journal-title":"Stanford Law Review"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2815595"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2262942"},{"key":"ref49","first-page":"40","article-title":"Face Recognition in the Virtual World: Recognizing Avatar Faces","author":"yampolskiy","year":"2012","journal-title":"Mach Learning Proc 11th Int Conf"},{"key":"ref9","volume":"543","author":"clavell","year":"2017","journal-title":"Protect rights at automated borders Nature"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1867713.1867715"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.2991\/978-94-91216-08-4"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1088\/0031-8949\/92\/1\/013002"},{"journal-title":"AI now report","year":"2018","author":"whittaker","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1186\/s40535-016-0018-x"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1111\/rssa.12358"},{"journal-title":"Layers of Security","year":"2013","key":"ref44"},{"key":"ref43","first-page":"1","article-title":"Generative Adversarial Network for Radar Signal Generation","author":"truong","year":"2019","journal-title":"Int Joint Conf Neural Networks (IJCNN)"}],"event":{"name":"2020 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2020,7,19]]},"location":"Glasgow, United Kingdom","end":{"date-parts":[[2020,7,24]]}},"container-title":["2020 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9200848\/9206590\/09207385.pdf?arnumber=9207385","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:56:48Z","timestamp":1656439008000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9207385\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/ijcnn48605.2020.9207385","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}