{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:21:09Z","timestamp":1766269269035,"version":"3.37.3"},"reference-count":63,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2018YFB1305200"],"award-info":[{"award-number":["2018YFB1305200"]}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2015CB351704"],"award-info":[{"award-number":["2015CB351704"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572009","61632014","61802058","6181101568"],"award-info":[{"award-number":["61572009","61632014","61802058","6181101568"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2242018K3DN01","2242019K40047"],"award-info":[{"award-number":["2242018K3DN01","2242019K40047"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100015803","name":"Tencent AI Lab Rhino-Bird Focused Research Program","doi-asserted-by":"publisher","award":["JR201922"],"award-info":[{"award-number":["JR201922"]}],"id":[{"id":"10.13039\/100015803","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002341","name":"Academy of Finland","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003406","name":"Tekes Fidipro Program","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003406","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018948","name":"Infotech Oulu","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100018948","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1109\/tcyb.2019.2914512","type":"journal-article","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T20:18:19Z","timestamp":1559938699000},"page":"5047-5060","source":"Crossref","is-referenced-by-count":21,"title":["Toward Bridging Microexpressions From Different Domains"],"prefix":"10.1109","volume":"50","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0839-8792","authenticated-orcid":false,"given":"Yuan","family":"Zong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7764-5179","authenticated-orcid":false,"given":"Wenming","family":"Zheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0543-4196","authenticated-orcid":false,"given":"Zhen","family":"Cui","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3694-206X","authenticated-orcid":false,"given":"Guoying","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3514-5413","authenticated-orcid":false,"given":"Bin","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-013-0693-1"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s12193-015-0210-7"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2014.2306092"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2016.2535122"},{"key":"ref31","first-page":"2066","article-title":"Geodesic flow kernel for unsupervised domain adaptation","author":"gong","year":"2012","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit (CVPR)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46672-9_48"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2818346.2830584"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2014.2304712"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017623"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.03.018"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2806219"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2806216"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2554549"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2547397"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.451"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654916"},{"key":"ref2","first-page":"3515","article-title":"I see how you feel: Training laypeople and professionals to recognize fleeting emotions","author":"frank","year":"2009","journal-title":"Proc Ann Meeting of the Int Communication Ass"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126401"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACII.2013.90"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2672753"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2324759"},{"key":"ref24","first-page":"601","article-title":"Correcting sample selection bias by unlabeled data","author":"huang","year":"2006","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2013.2255278"},{"key":"ref26","first-page":"1391","article-title":"A least-squares approach to direct importance estimation","volume":"10","author":"kanamori","year":"2009","journal-title":"J Mach Learn Res"},{"key":"ref25","first-page":"1433","article-title":"Direct importance estimation with model selection and its application to covariate shift adaptation","author":"sugiyama","year":"2008","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2010.2091281"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.368"},{"key":"ref59","first-page":"115","article-title":"Learning precise timing with LSTM recurrent networks","volume":"3","author":"gers","year":"2002","journal-title":"J Mach Learn Res"},{"key":"ref58","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2964284.2967247"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15561-1_16"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.183"},{"key":"ref54","first-page":"1665","article-title":"Supervised transfer sparse coding","author":"al-shedivat","year":"2014","journal-title":"Proc 28th AAAI Conf Artif Intell"},{"key":"ref53","first-page":"1192","article-title":"Latent low-rank transfer subspace learning for missing modality recognition","author":"ding","year":"2014","journal-title":"Proc AAAI"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2373376"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2015.10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.10.096"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553434"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2017.2667642"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2015.2485205"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2016.2518162"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2305701"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2502483"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3123266.3123367"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2016.2563432"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/T-AFFC.2010.8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10979-008-9166-4"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"86","DOI":"10.5040\/9798216002246.ch-005","article-title":"Behavior and security","author":"frank","year":"2009","journal-title":"Protecting Airline Passengers in the Age of Terrorism"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1110"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2417211"},{"key":"ref8","first-page":"325","article-title":"Micro-expression recognition using robust principal component analysis and local spatiotemporal directional features","author":"wang","year":"2014","journal-title":"Proc Workshop Eur Conf Comput Vis"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2013.6553709"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0086041"},{"key":"ref9","first-page":"2080","article-title":"Robust principal component analysis: Exact recovery of corrupted low-rank matrices via convex optimization","author":"wright","year":"2009","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.20"},{"key":"ref45","first-page":"222","article-title":"Connecting the dots with landmarks: Discriminatively learning domain-invariant features for unsupervised domain adaptation","author":"gong","year":"2013","journal-title":"Proc ICML"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2013.6553717"},{"key":"ref47","first-page":"491","volume":"6","author":"liu","year":"2009","journal-title":"SLEP Sparse Learning with Efficient Projections"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2820321"},{"key":"ref41","first-page":"612","article-title":"Linearized alternating direction method with adaptive penalty for low rank representation","author":"lin","year":"2011","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btl242"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2537926"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/9279348\/08733090.pdf?arnumber=8733090","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T10:09:15Z","timestamp":1721383755000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8733090\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":63,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2019.2914512","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"type":"print","value":"2168-2267"},{"type":"electronic","value":"2168-2275"}],"subject":[],"published":{"date-parts":[[2020,12]]}}}