{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:35:27Z","timestamp":1757309727855,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,17]],"date-time":"2024-09-17T00:00:00Z","timestamp":1726531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,17]],"date-time":"2024-09-17T00:00:00Z","timestamp":1726531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,17]]},"DOI":"10.1109\/mcna63144.2024.10703876","type":"proceedings-article","created":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T17:45:05Z","timestamp":1728495905000},"page":"28-34","source":"Crossref","is-referenced-by-count":2,"title":["Leveraging Local Binary Patterns with Transfer Learning for Face Recognition in Low-light Conditions"],"prefix":"10.1109","author":[{"given":"Lubana Al","family":"Rayes","sequence":"first","affiliation":[{"name":"University of Sharjah Sharjah,Computer Science Department,UAE"}]},{"given":"Menatalla","family":"Haggag","sequence":"additional","affiliation":[{"name":"University of Sharjah Sharjah,Computer Science Department,UAE"}]},{"given":"Mohammad","family":"Alsmirat","sequence":"additional","affiliation":[{"name":"University of Sharjah Sharjah,Computer Science Department,UAE"}]}],"member":"263","reference":[{"article-title":"The threat of facial recognition technology","year":"2023","author":"Mehta","key":"ref1"},{"key":"ref2","article-title":"Face detection: Present state and research directions","author":"Prabhat","year":"2024","journal-title":"ArXiv"},{"article-title":"Understanding the local binary pattern (lbp): A powerful method for texture analysis in computer vision","year":"2023","author":"Ihalapathirana","key":"ref3"},{"article-title":"What is deep learning and how does it work? - definition from techtarget","year":"2024","author":"Gillis","key":"ref4"},{"article-title":"What is transfer learning? a guide for deep learning","year":"2022","author":"Donges","key":"ref5"},{"journal-title":"AWS","article-title":"What is facial recognition? - facial recognition technology explained","year":"2024","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNEA50255.2020.00015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/ipr2.12192"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4236\/opj.2021.114005"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ViTECoN58111.2023.10157843"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.29207\/resti.v7i2.4630"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.56028\/aetr.9.1.170.2024"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1504\/IJDMB.2023.10058131"},{"article-title":"A recurrent feature iterative network for suspect identification using convolutional and long short term memory approach","author":"Shree","key":"ref14","doi-asserted-by":"crossref","DOI":"10.21203\/rs.3.rs-4250349\/v1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/aiam50918.2020.00024"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT56998.2023.10307725"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532955"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IAEAC.2017.8054074"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC.2019.8729021"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICoICT55009.2022.9914875"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3179951"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2017.8296251"},{"issue":"4","key":"ref23","first-page":"121","article-title":"Face recognition using transfer learning by deep vgg16 model","volume":"9","author":"Singh","year":"2022","journal-title":"JETIR"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.54254\/2755-2721\/39\/20230593"},{"article-title":"Facial recognition using google\u2019s convolutional neural network","year":"2017","author":"Koehrsen","key":"ref25"},{"article-title":"Densenet121","year":"2020","author":"Moran","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/34.927464"}],"event":{"name":"2024 International Conference on Multimedia Computing, Networking and Applications (MCNA)","start":{"date-parts":[[2024,9,17]]},"location":"Valencia, Spain","end":{"date-parts":[[2024,9,20]]}},"container-title":["2024 International Conference on Multimedia Computing, Networking and Applications (MCNA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10703864\/10703853\/10703876.pdf?arnumber=10703876","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T11:22:20Z","timestamp":1728559340000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10703876\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,17]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/mcna63144.2024.10703876","relation":{},"subject":[],"published":{"date-parts":[[2024,9,17]]}}}