{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T10:21:21Z","timestamp":1770891681598,"version":"3.50.1"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T00:00:00Z","timestamp":1417392000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61103156"],"award-info":[{"award-number":["61103156"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61473291"],"award-info":[{"award-number":["61473291"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/tifs.2014.2359632","type":"journal-article","created":{"date-parts":[[2014,9,22]],"date-time":"2014-09-22T20:15:32Z","timestamp":1411416932000},"page":"2035-2050","source":"Crossref","is-referenced-by-count":34,"title":["Dynamic Image-to-Class Warping for Occluded Face Recognition"],"prefix":"10.1109","volume":"9","author":[{"given":"Xingjie","family":"Wei","sequence":"first","affiliation":[]},{"given":"Chang-Tsun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Stan Z.","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/34.908974"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1991.139758"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.244"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.5244\/C.26.99"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.80"},{"key":"ref36","first-page":"331","article-title":"Robust and practical face recognition via structured sparsity","volume":"7575","author":"jia","year":"2012","journal-title":"Proc 12th Eur Conf Comput Vis (ECCV)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1998.678085"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587598"},{"key":"ref28","author":"miranda","year":"2014","journal-title":"The Face We Make"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.268"},{"key":"ref29","article-title":"Labeled faces in the wild: A database for studying face recognition in unconstrained environments","author":"huang","year":"2007"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2010.5544616"},{"key":"ref1","first-page":"299","article-title":"Why is facial occlusion a challenging problem?","author":"ekenel","year":"2009","journal-title":"Proc IAPR Int Conf Biometrics (ICB)"},{"key":"ref20","first-page":"2618","article-title":"Low-rank matrix recovery with structural incoherence for robust face recognition","author":"chen","year":"2012","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit (CVPR)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1978.1163055"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.03.013"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2013.6553747"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01793-3_5"},{"key":"ref26","article-title":"The AR face database","author":"martinez","year":"1998"},{"key":"ref25","first-page":"1","article-title":"Robust face recognition with occlusions in both reference and query images","author":"wei","year":"2013","journal-title":"Proceedings of International Workshop on Biometrics and Forensics (I-WBF)"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.1995.1004"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2013.59"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2013.18"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00268-4"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"1:1","DOI":"10.1155\/2009\/184617","article-title":"Recognition of faces in unconstrained environments: A comparative study","volume":"2009","author":"ruiz-del solar","year":"2009","journal-title":"EURASIP J Adv Signal Process"},{"key":"ref53","first-page":"1","article-title":"Local higher-order statistics (LHS) for texture categorization and facial analysis","volume":"7578","author":"sharma","year":"2012","journal-title":"Proc 12th Eur Conf Comput Vis (ECCV)"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2159205"},{"key":"ref10","first-page":"448","article-title":"Gabor feature based sparse representation for face recognition with Gabor occlusion dictionary","volume":"6316","author":"yang","year":"2010","journal-title":"Proc 11th Eur Conf Comput Vis (ECCV)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126277"},{"key":"ref40","first-page":"404","article-title":"SURF: Speeded up robust features","volume":"3951","author":"bay","year":"2006","journal-title":"Proc Eur Conf Comp Vis (ECCV)"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1109\/TPAMI.2010.220","article-title":"Maximum correntropy criterion for robust face recognition","volume":"33","author":"he","year":"2011","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DICTA.2012.6411704"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1008382"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.849817"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1109\/TIFS.2009.2020772","article-title":"Face recognition under occlusions and variant expressions with partial similarity","volume":"4","author":"tan","year":"2009","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.191"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.40"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199752"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2012.6239211"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383052"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.2008.4813410"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2011.5771439"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.79"},{"key":"ref7","first-page":"136","article-title":"Support Vector Machines in face recognition with occlusions","author":"jia","year":"2009","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit (CVPR)"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.389"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.128"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000013087.49260.fb"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.10.017"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.5244\/C.23.7"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2004.10.113"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2006.105"},{"key":"ref41","first-page":"1050","article-title":"Face recognition with contiguous occlusion using Markov random fields","author":"zhou","year":"2009","journal-title":"Proc IEEE 12th Int Conf Comput Vis (ICCV)"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2006.68"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.999679"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6953163\/06906281.pdf?arnumber=6906281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:29:00Z","timestamp":1642004940000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6906281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":56,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2014.2359632","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12]]}}}