{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:10:08Z","timestamp":1755911408499,"version":"3.44.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/ivcnz48456.2019.8960989","type":"proceedings-article","created":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T21:21:23Z","timestamp":1579209683000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Identifying Simple Shapes to Classify the Big Picture"],"prefix":"10.1109","author":[{"given":"Megan","family":"Liang","sequence":"first","affiliation":[{"name":"Victoria University of Wellington,Wellington,New Zealand"}]},{"given":"Gabrielle","family":"Palado","sequence":"additional","affiliation":[{"name":"Victoria University of Wellington,Wellington,New Zealand"}]},{"given":"Will N.","family":"Browne","sequence":"additional","affiliation":[{"name":"Victoria University of Wellington,Wellington,New Zealand"}]}],"member":"263","reference":[{"key":"ref39","first-page":"3320","article-title":"How transferable are features in deep neural networks","author":"yosinski","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5725-8_8"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"journal-title":"One pixel attack for fooling deep neural networks","year":"2017","author":"su","key":"ref32"},{"key":"ref31","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"The Journal of Machine Learning Research"},{"key":"ref30","first-page":"3856","article-title":"Dynamic routing between capsules","author":"sabour","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1111\/j.1749-6632.1950.tb53974.x"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.324"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-55007-6"},{"journal-title":"tomahim\/py&#x2013;image&#x2013;dataset&#x2013;generator Get a large image dataset with minimal effort by grabbing image through the web and generate new ones by image augmentation","year":"0","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1830761.1830898"},{"key":"ref40","first-page":"1205","article-title":"Efficient feature selection via analysis of relevance and redundancy","volume":"5","author":"yu","year":"2004","journal-title":"Journal of Machine Learning Research"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038465"},{"journal-title":"Comparing deep neural networks against humans object recognition when the signal gets weaker","year":"2017","author":"geirhos","key":"ref13"},{"journal-title":"Neural Networks A Comprehensive Foundation","year":"2004","author":"haykin","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"journal-title":"Adaptation in Natural and Artificial Systems","year":"1975","author":"holland","key":"ref16"},{"journal-title":"BioHEL tutorial","year":"0","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/331499.331504"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367540"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3800(02)00064-9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/34.993558"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-4115(97)80105-7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.2307\/1164905"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1038\/323533a0","article-title":"Learning representations by back&#x2013;propagating errors","volume":"323","author":"rumelhart","year":"1986","journal-title":"Nature"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1162\/106365603322365289"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1051\/itmconf\/20160801005"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00063-5"},{"journal-title":"Biohel Bioinformatics-oriented hierarchical evolutionary learning","year":"0","author":"bacardit","key":"ref2"},{"key":"ref9","article-title":"Clever algorithms: nature&#x2013;inspired programming recipes","author":"brownlee","year":"2011","journal-title":"Jason Brownlee"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71231-2_19"},{"key":"ref20","first-page":"3","article-title":"Supervised machine learning: A review of classification techniques","volume":"160","author":"kotsiantis","year":"2007","journal-title":"Emerging Artificial Intelligence Applications in Computer Engineering"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref21","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref42","first-page":"818","article-title":"Visualizing and understanding convolutional networks","author":"zeiler","year":"2014","journal-title":"European Conference on Computer Vision"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014046307775"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-014-1357-y"},{"key":"ref23","first-page":"740","article-title":"Microsoft COCO: Common objects in context","author":"lin","year":"2014","journal-title":"European Conference on Computer Vision"},{"key":"ref26","first-page":"5","article-title":"Inceptionism: Going deeper into neural networks","volume":"20","author":"mordvintsev","year":"2015","journal-title":"Google Research Blog"},{"year":"2018","key":"ref25","article-title":"Matterport\/mask rcnn: Mask R&#x2013;CNN for object detection and instance segmentation on keras and tensorflow"}],"event":{"name":"2019 International Conference on Image and Vision Computing New Zealand (IVCNZ)","start":{"date-parts":[[2019,12,2]]},"location":"Dunedin, New Zealand","end":{"date-parts":[[2019,12,4]]}},"container-title":["2019 International Conference on Image and Vision Computing New Zealand (IVCNZ)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8955481\/8960955\/08960989.pdf?arnumber=8960989","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:44:09Z","timestamp":1755909849000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8960989\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/ivcnz48456.2019.8960989","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}