{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T23:02:04Z","timestamp":1768431724805,"version":"3.49.0"},"reference-count":160,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62471451"],"award-info":[{"award-number":["62471451"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"University of Science and Technology of China and China Merchants Bank","award":["FTIT2022058"],"award-info":[{"award-number":["FTIT2022058"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Artif. Intell."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1109\/tai.2025.3574300","type":"journal-article","created":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T14:14:19Z","timestamp":1748441659000},"page":"60-75","source":"Crossref","is-referenced-by-count":1,"title":["A Survey on Deep Learning-Based Chinese Font Style Transfer"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-1286-7740","authenticated-orcid":false,"given":"Zheyong","family":"Ren","sequence":"first","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5130-239X","authenticated-orcid":false,"given":"Yuhan","family":"Pan","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6982-8045","authenticated-orcid":false,"given":"Jieyan","family":"Chen","sequence":"additional","affiliation":[{"name":"Artificial Intelligence Laboratory of China Merchants Bank, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5586-8083","authenticated-orcid":false,"given":"Lin","family":"Zhao","sequence":"additional","affiliation":[{"name":"Artificial Intelligence Laboratory of China Merchants Bank, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3956-7042","authenticated-orcid":false,"given":"Ming","family":"Liao","sequence":"additional","affiliation":[{"name":"Artificial Intelligence Laboratory of China Merchants Bank, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7200-7124","authenticated-orcid":false,"given":"Xuecheng","family":"Qian","sequence":"additional","affiliation":[{"name":"Artificial Intelligence Laboratory of China Merchants Bank, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2986-3956","authenticated-orcid":false,"given":"Wei","family":"Gong","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Founder type","year":"2005"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/274644.274658"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.68.4.60.42736"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3498361.3538930"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/15886.15911"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0146-664X(79)90046-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/800064.801298"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/0097-8493(84)90050-5"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(97)00073-1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2008.01276"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2013.12.013"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2011.56"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2950908"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2761740"},{"key":"ref16","first-page":"1","article-title":"Deep neural networks for object detection","volume":"26","author":"Szegedy","year":"2013","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref17","first-page":"46","article-title":"How transferable are features in deep neural networks?","volume":"27","author":"Yosinski","year":"2014","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685725"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10721-6"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7068349"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2377-9"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34372-9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-3972-7_19"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2011-000464"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-023-00729-y"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1973.4309314"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1080\/01431160600746456"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2876865"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2023.3238524"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20077-9_17"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s13735-017-0141-z"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2018.00163"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01104"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2019.2921336"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.296"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.265"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1142\/WSSNSA"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/su15075930"},{"key":"ref40","volume-title":"Deep Learning.","author":"Goodfellow","year":"2016"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2018.02.016"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2825144"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2023.3247480"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969125"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01219-9_11"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2022.107208"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1603.08155"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.167"},{"key":"ref49","article-title":"Rewrite","author":"Tian","year":"2017"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3145749.3149440"},{"issue":"8","key":"ref51","first-page":"1125","article-title":"Applications of deep learning for handwritten Chinese character recognition: A review","volume":"42","author":"Lian-Wen","year":"2016","journal-title":"Acta Autom. Sin."},{"key":"ref52","first-page":"29","article-title":"Chinese character generation method based on deep learning","volume":"57","author":"Zijun","year":"2021","journal-title":"Comput. Eng. Appl."},{"key":"ref53","volume-title":"Research on Chinese Font Styletransfer Based on Generative Adversarial Network.","author":"Chen","year":"2022"},{"key":"ref54","first-page":"510","article-title":"Review of Chinese font style transfer research based on deep learning","volume":"56","author":"Ruo-Ran Cheng Adn","year":"2022","journal-title":"J. Zhejiang Univ. (Eng. Sci.)"},{"issue":"12","key":"ref55","doi-asserted-by":"crossref","first-page":"3415","DOI":"10.11834\/jig.210360","article-title":"Review of chinese characters generation and font transfer based on deep learning","volume":"27","author":"Wang","year":"2022","journal-title":"J. Image Graph."},{"key":"ref56","article-title":"zi2zi: Master chinese calligraphy with conditional adversarial networks","author":"Yuchen Tian","year":"2017"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110235"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2997080"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-4-431-68147-2_21"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/0010-4485(90)90040-J"},{"key":"ref61","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04919-8","volume-title":"B\u00e9zier B-Spline Techniques","volume":"6","author":"Prautzsch","year":"2002"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-079050-0.50011-4"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/192161.192186"},{"key":"ref64","volume-title":"Elasticity: Theory, Applications, and Numerics.","author":"Sadd","year":"2009"},{"key":"ref65","volume-title":"Mathematical Theory of Elastic Structures.","author":"Feng","year":"2013"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/38.761553"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/PCCGA.2004.1348363"},{"key":"ref68","first-page":"57","article-title":"Interactive 3d painting on point-sampled objects","volume-title":"Proc. Point-Based Graphics","author":"Adams","year":"2004"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8659.t01-2-00701"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/1730804.1730826"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3410530.3414588"},{"key":"ref72","volume-title":"Introduction to Computer Graphics.","volume":"55","author":"Foley","year":"1994"},{"key":"ref73","volume-title":"Computer Graphics: Principles and Practice.","volume":"12110","author":"Foley","year":"1996"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1287\/opre.21.2.498"},{"issue":"14","key":"ref75","first-page":"61","article-title":"An automatic derivation of chinese character typeface from hei-ti to li-shu","volume":"6","author":"Gao","year":"1995","journal-title":"Chin. Sci. Abstr. Ser. A"},{"key":"ref76","first-page":"561","article-title":"The automatic generation algorithm for dynamic chinese font","volume":"22","author":"Pan","year":"1996","journal-title":"Acta Autom. Sin."},{"issue":"9","key":"ref77","first-page":"660","article-title":"Description and generation of chinese outline based on c-bezier curves","volume":"12","author":"Yang","year":"2000","journal-title":"J. Comput. AIDED Des. Comput. Graph."},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa8415"},{"key":"ref79","volume-title":"What is Machine Learning?","author":"Naqa","year":"2015"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.91.045002"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.3390\/s18082674"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1093\/aje\/kwz189"},{"key":"ref83","volume-title":"Artificial Neural Networks.","author":"Yegnanarayana","year":"2009"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-60327-101-1_2"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuron.2020.09.005"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1002\/0471497398.mm421"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref88","article-title":"Unsupervised image-to-image translation networks","volume":"30","author":"Liu","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.310"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00916"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1038\/323533a0"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127647"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/3213767"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04221-9_43"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2018.00028"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33014015"},{"issue":"2","key":"ref97","first-page":"19","article-title":"Safont: Automatic font synthesis using self-attention mechanisms","volume":"16","author":"Ren","year":"2019","journal-title":"Aust. J. Intell. Inf. Process. Syst"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.01065"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/3355089.3356574"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58529-7_43"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58539-6_10"},{"key":"ref102","article-title":"Calligan: Style and structure-aware chinese calligraphy character generator","author":"Wu","year":"2020"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9206851"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01364"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00048"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107334"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3196675"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00509"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00774"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01312"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548414"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICME52920.2022.9859964"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00185"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2024.3382621"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2011.6011892"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/3005358.3005371"},{"key":"ref117","article-title":"Instance segmentation for chinese character stroke extraction, datasets and benchmarks","author":"Liu","year":"2022"},{"key":"ref118","first-page":"61","article-title":"Creating new chinese fonts based on manifold learning and adversarial networks","volume-title":"Proc. EuroGraph. (Short Papers)","author":"Guo","year":"2018"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM50583.2021.9439117"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/2942358.2942368"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2406669"},{"key":"ref122","article-title":"Analyzing 50k fonts","author":"Bernhardsson","year":"2023"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00636"},{"key":"ref124","article-title":"pix2pix","author":"Phillip Isola","year":"2016"},{"key":"ref125","article-title":"Unsupervised cross-domain image generation","author":"Taigman","year":"2016"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2014.6918213"},{"key":"ref127","article-title":"Clova ai","year":"2024"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1002\/nav.20053"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/3698772"},{"key":"ref130","article-title":"Coupled generative adversarial networks","volume":"29","author":"Liu","year":"2016","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref131","article-title":"Densenet: Implementing efficient convnet descriptor pyramids","author":"Iandola","year":"2014"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref134","article-title":"Recurrent models of visual attention","volume":"27","author":"Mnih","year":"2014","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.03.091"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/s41095-022-0271-y"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46484-8_31"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/128"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2019.00095"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01372"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2017.181"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3218982"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2023.100844"},{"key":"ref144","article-title":"Casia online and offline chinese handwriting databases","year":"2023"},{"key":"ref145","article-title":"Flexifont","author":"Wang Xuan","year":"2023"},{"key":"ref146","article-title":"Chinese calligraphy text image library","author":"Zhao","year":"2023"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2011.17"},{"key":"ref148","volume-title":"CJKV Information Processing.","author":"Lunde","year":"2008"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00341"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.03.025"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.findings-acl.242"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00220"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2021.07.003"},{"key":"ref155","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Radford","year":"2021"},{"key":"ref156","volume-title":"Linguistics: An Introduction.","author":"McGregor","year":"2024"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.2307\/jj.8501361"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1186\/s41257-024-00110-w"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/3663363"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-main.85"}],"container-title":["IEEE Transactions on Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9078688\/11329125\/11016189.pdf?arnumber=11016189","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T18:38:46Z","timestamp":1767724726000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11016189\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":160,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tai.2025.3574300","relation":{},"ISSN":["2691-4581"],"issn-type":[{"value":"2691-4581","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]}}}