{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T08:08:22Z","timestamp":1759565302718,"version":"3.37.3"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836217"],"award-info":[{"award-number":["U1836217"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tifs.2022.3164187","type":"journal-article","created":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T19:49:52Z","timestamp":1648842592000},"page":"1513-1527","source":"Crossref","is-referenced-by-count":10,"title":["A Unified Framework for Biphasic Facial Age Translation With Noisy-Semantic Guided Generative Adversarial Networks"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9506-7643","authenticated-orcid":false,"given":"Muyi","family":"Sun","sequence":"first","affiliation":[{"name":"National Laboratory of Pattern Recognition, Center for Research on Intelligent Perception and Computing, Institute of Automation, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Jian","family":"Wang","sequence":"additional","affiliation":[{"name":"National Laboratory of Pattern Recognition, Center for Research on Intelligent Perception and Computing, Institute of Automation, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Jian","family":"Liu","sequence":"additional","affiliation":[{"name":"Ant Group, Beijing, China"}]},{"given":"Jianshu","family":"Li","sequence":"additional","affiliation":[{"name":"Ant Group, Beijing, China"}]},{"given":"Tao","family":"Chen","sequence":"additional","affiliation":[{"name":"Ant Group, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4029-9935","authenticated-orcid":false,"given":"Zhenan","family":"Sun","sequence":"additional","affiliation":[{"name":"National Laboratory of Pattern Recognition, Center for Research on Intelligent Perception and Computing, Institute of Automation, Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"issue":"1355","key":"ref1","first-page":"4352","article-title":"Perception of age in adult Caucasian male faces: Computer graphic manipulation of shape and colour information","volume":"259","author":"Michael","year":"2017","journal-title":"Proc. Royal Soc. London. Ser. B, Biol. Sci."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.463"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.36"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2021.3059336"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2930985"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01215"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/34.993553"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0280-132"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2342896.2343002"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1098\/rspb.1995.0021"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/38.946630"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.426"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2015.12.015"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2705122"},{"issue":"4","key":"ref15","first-page":"905","article-title":"Generative adversarial nets","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","volume":"40","author":"Goodfellow"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00828"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8545119"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6800"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01341"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00917"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.437"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00519"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58542-6_24"},{"key":"ref26","article-title":"Learning hierarchical semantic image manipulation through structured representations","author":"Hong","year":"2018","journal-title":"arXiv:1808.07535"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00244"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00515"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3076487"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00518"},{"key":"ref31","first-page":"7354","article-title":"Self-attention generative adversarial networks","volume-title":"Proc. ICML","author":"Zhang"},{"key":"ref32","article-title":"Multi-channel attention selection GANs for guided image-to-image translation","author":"Tang","year":"2020","journal-title":"arXiv:2002.01048"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00318"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3050918"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978942"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2928540"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00512"},{"key":"ref38","first-page":"7282","article-title":"Self-attention generative adversarial networks","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","volume":"2021","author":"Huang"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01261-8_20"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00326"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484329"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3090866"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2833032"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/FGR.2006.78"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2015.2420374"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/239480"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.463"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.403"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-019-01165-5"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3065499"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"volume-title":"Face++ Research Toolkit","year":"2021","key":"ref53"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-019-01210-3"},{"key":"ref55","first-page":"1","article-title":"GANs trained by a two time-scale update rule converge to a local nash equilibrium","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","author":"Heusel"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9652463\/09745962.pdf?arnumber=9745962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T00:27:55Z","timestamp":1705537675000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9745962\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/tifs.2022.3164187","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2022]]}}}