{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:41:38Z","timestamp":1725586898594},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/infocomwkshps50562.2020.9162653","type":"proceedings-article","created":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T21:55:09Z","timestamp":1597096509000},"page":"103-108","source":"Crossref","is-referenced-by-count":0,"title":["A View-Invariant Feature Learning Model for Cross-View Security Authentication in Mobile Smart Devices"],"prefix":"10.1109","author":[{"given":"Ao","family":"Li","sequence":"first","affiliation":[]},{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Deyun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Guanglu","family":"Sun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.02.008"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996272"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.01.051"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126422"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.93"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2464090"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.29"},{"key":"ref17","article-title":"Robust multi-view subspace learning through dual low-rank decompositions","author":"ding","year":"0","journal-title":"THIRTIETH AAAI Conference on Artificial Intelligence"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0215450"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0199141"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1137\/080730421"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2878542"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/361573.361582"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2862159"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00298"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.07.016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/34.598228"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.1991.3.1.71"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.02.005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2435740"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEW.2018.8551527"},{"key":"ref20","article-title":"Low-rank sparse subspace for spectral clustering","author":"zhu","year":"2018","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.08.024"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2825647"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00207-6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2865885"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1970392.1970395"},{"journal-title":"The augmented Lagrange multiplier method for exact recovery of corrupted low-rank matrices","year":"2010","author":"lin","key":"ref25"}],"event":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","start":{"date-parts":[[2020,7,6]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2020,7,9]]}},"container-title":["IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9146478\/9162584\/09162653.pdf?arnumber=9162653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:51:50Z","timestamp":1656453110000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9162653\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/infocomwkshps50562.2020.9162653","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}