{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T23:56:08Z","timestamp":1703030168156},"reference-count":23,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T00:00:00Z","timestamp":1414800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/tifs.2014.2355495","type":"journal-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T18:38:58Z","timestamp":1410374338000},"page":"1953-1961","source":"Crossref","is-referenced-by-count":7,"title":["Sample Space Dimensionality Refinement for Symmetrical Object Detection"],"prefix":"10.1109","volume":"9","author":[{"given":"Yun-Fu","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jing-Ming","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Chih-Hsien","family":"Hsia","sequence":"additional","affiliation":[]},{"given":"Sheng-Yao","family":"Su","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.02.026"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.06.029"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/14786440109462720"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/0165-1684(94)90029-9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2186310"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000013087.49260.fb"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-006-0027-7"},{"key":"ref17","year":"2014","journal-title":"MIT CBCL Face Database"},{"key":"ref18","year":"2014","journal-title":"Inria person database"},{"key":"ref19","year":"2014","journal-title":"NTUST MSPLab License Plate Database"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.09.014"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276876"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/31.192419"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-006-9794-4"},{"key":"ref8","first-page":"933","article-title":"An efficient boosting algorithm for combining preferences","volume":"4","author":"freund","year":"2004","journal-title":"J Mach Learn Res"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1049\/ip-g-2.1992.0050","article-title":"conjugate gradient algorithm for efficient training of artificial neural networks","volume":"139","author":"charalambous","year":"1992","journal-title":"Circuits Devices and Systems IEE Proceedings G"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.195"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1177\/027836402128964611"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2012.09.012"},{"key":"ref20","author":"gonzalez","year":"2008","journal-title":"Digital Image Processing"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/978-3-540-74549-5_2","article-title":"Face detection based on multi-block LBP representation","volume":"4642","author":"zhang","year":"2007","journal-title":"Advances in Biometrics"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/978-3-540-45243-0_39","article-title":"Empirical analysis of detection cascades of boosted classifiers for rapid object detection","volume":"2781","author":"lienhart","year":"2003","journal-title":"Proc Pattern Recognition Symp"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2013.6731343"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6912034\/06894132.pdf?arnumber=6894132","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:52:28Z","timestamp":1642006348000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6894132"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":23,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2014.2355495","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11]]}}}