{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T02:33:27Z","timestamp":1772159607134,"version":"3.50.1"},"reference-count":148,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102318"],"award-info":[{"award-number":["62102318"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["G2020KY05113"],"award-info":[{"award-number":["G2020KY05113"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2019YFA0706200"],"award-info":[{"award-number":["2019YFA0706200"]}]},{"name":"National Key Research and Development Program of China","award":["2019YFB1703600"],"award-info":[{"award-number":["2019YFB1703600"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702195"],"award-info":[{"award-number":["61702195"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61751202"],"award-info":[{"award-number":["61751202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1813203"],"award-info":[{"award-number":["U1813203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1801262"],"award-info":[{"award-number":["U1801262"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61751205"],"award-info":[{"award-number":["61751205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Major Project of Guangzhou","award":["202007030006"],"award-info":[{"award-number":["202007030006"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Artif. Intell."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/tai.2021.3139058","type":"journal-article","created":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T16:24:39Z","timestamp":1640708679000},"page":"323-343","source":"Crossref","is-referenced-by-count":26,"title":["A Survey on Masked Facial Detection Methods and Datasets for Fighting Against COVID-19"],"prefix":"10.1109","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2603-8328","authenticated-orcid":false,"given":"Bingshu","family":"Wang","sequence":"first","affiliation":[{"name":"School of Software, Taicang Campus, Northwestern Polytechnical University, Suzhou, China"}]},{"given":"Jiangbin","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Software, Taicang Campus, Northwestern Polytechnical University, Suzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5451-7230","authenticated-orcid":false,"given":"C. L. Philip","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1056\/nejmoa2001017"},{"key":"ref3","article-title":"Coronavirus pandemic (COVID-19)","author":"Roser","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3062771"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2020.3020521"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.32628\/ijsrset207539"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3027685"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3054609"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-021-10131-x"},{"key":"ref11","article-title":"Retinamask: A face mask detector","author":"Jiang","year":"2020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2020.108288"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106906"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-021-00774-w"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.102719"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-04166-9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3064913"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.abd3083"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMp2006372"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S2213-2600(20)30134-X"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.15557\/pimr.2020.0005"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.08.056"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2020.12.1042"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2020.12.864"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3095191"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ibmed.2021.100037"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.32604\/cmes.2021.014478"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.30595\/juita.v9i1.9624"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2021.9451245"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3100070"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/s21093263"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/su13126900"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare9081050"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/app11083495"},{"key":"ref35","article-title":"Smart surveillance system to monitor the committed violations during the pandemic","author":"Mohammed","year":"2021","journal-title":"Int. J. Comput. Digit. Syst."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102692"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocab052"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.smhl.2020.100144"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3039862"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/s20185236"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-0749-3_52"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102600"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s41403-020-00157-z"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2021.3069844"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.47738\/ijiis.v4i1.75"},{"key":"ref46","first-page":"1","article-title":"Automated realtime mask availability detection using neural network","volume":"10","author":"Omar","year":"2021","journal-title":"Int. J. Comput. Digit. Syst."},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3066538"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10711-8"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3390\/app11052070"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10070837"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2021.166744"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.53"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2023.3242085"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.596"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-022-02308-x"},{"key":"ref58","article-title":"Labeled faces in the wild: Updates and new reporting procedures","volume":"14","author":"Huang","year":"2014"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-4673-4_49"},{"key":"ref65","article-title":"Masked face recognition for secure authentication","author":"Anwar","year":"2020"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2015.03.015"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2001.990517"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000013087.49260.fb"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19390-8_16"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(95)00067-4"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/IES50839.2020.9231934"},{"key":"ref73","first-page":"1","article-title":"IoT-based system for COVID-19 indoor safety monitoring","volume-title":"IcETRAN","volume":"2020","author":"Petrovic","year":"2020"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ISESD53023.2021.9501914"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/EIT51626.2021.9491842"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1906\/1\/012012"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00894-0"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66665-1_6"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1757\/1\/012140"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.2352\/ei.2023.35.11.hpci-229"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1678\/1\/012089"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT49239.2020.9225384"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/B-HTC50970.2020.9297902"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIS50930.2021.9395857"},{"key":"ref85","article-title":"Face mask detection using yolov5 for COVID-19","author":"Sharma","year":"2020"},{"key":"ref86","article-title":"Real-time face mask detection in video data","author":"Ding","year":"2021"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC51575.2020.9345042"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/iEECON51072.2021.9440346"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/IEMTRONICS51293.2020.9216386"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-4236-1_16"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1518\/1\/012041"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00343"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICBAIE52039.2021.9389953"},{"key":"ref94","article-title":"Facial Recognition and Face Mask Detection Using Machine Learning Techniques","author":"Boulos","year":"2021"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00525"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.3390\/rs12030458"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-018-9650-2"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"ref99","article-title":"Face attention network: An effective face detector for the occluded faces","author":"Wang","year":"2017"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698572"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01240-3_49"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2577031"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.l007\/978-3-319-46448-0_2"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref106","article-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications","author":"Howard","year":"2017"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2876865"},{"key":"ref108","article-title":"YOLOv4: Optimal speed and accuracy of object detection","author":"Bochkovskiy","year":"2020"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00520"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2716952"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref113","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","volume":"25","author":"Krizhevsky","year":"2012","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3108126"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/I2CT51068.2021.9418207"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/CICN49253.2020.9242625"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon45413.2021.9401874"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ISETC50328.2020.9301079"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ICECOCS50124.2020.9314511"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-4673-4_48"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON49873.2020.9342585"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.15439\/2020F143"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/INCET51464.2021.9456415"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2866622"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.3043147"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3011937"},{"key":"ref128","article-title":"Monitoring COVID-19 prevention measures on CCTV cameras using deep learning","author":"Cota","year":"2020"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369493"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS.2017.8274819"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ISC251055.2020.9239012"},{"key":"ref132","article-title":"High-resolution representations for labeling pixels and regions","author":"Sun","year":"2019"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58558-7_29"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2017.8296962"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2929257"},{"key":"ref136","article-title":"YOLOv3: An incremental improvement","author":"Redmon","year":"2018"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/3428361.3432075"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977386"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajic.2020.09.012"},{"key":"ref140","article-title":"Covertheface: Face covering monitoring and demonstrating using deep learning and statistical shape analysis","author":"Hu","year":"2021"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/9242917"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58452-8_13"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00667"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01264-9_45"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413960"},{"key":"ref146","article-title":"Unmasking face embeddings by self-restrained triplet loss for accurate masked face recognition","author":"Boutros","year":"2021"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413723"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.3390\/app11167310"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3091289"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2021.3071663"},{"key":"ref152","article-title":"Masked face recognition challenge: The WebFace260 M track report","author":"Zhu","year":"2021"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484337"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00165"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIA52082.2021.9403577"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEW53276.2021.9456012"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEW53276.2021.9455962"}],"container-title":["IEEE Transactions on Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9078688\/9781840\/09664332.pdf?arnumber=9664332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:10:05Z","timestamp":1755911405000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9664332\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":148,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tai.2021.3139058","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.18316517.v1","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.18316517","asserted-by":"object"}]},"ISSN":["2691-4581"],"issn-type":[{"value":"2691-4581","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6]]}}}