{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:53:08Z","timestamp":1773931988990,"version":"3.50.1"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Ministry of Education, Republic of Singapore, through the Start-Up Grant"},{"DOI":"10.13039\/501100001381","name":"National Research Foundation (NRF) Singapore","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Singapore Cybersecurity Consortium (SGCSC) Grant Office","award":["SGCSC_Grant_2019-S01"],"award-info":[{"award-number":["SGCSC_Grant_2019-S01"]}]},{"name":"NSFC\/Research Grants Council (RGC) Joint Research Scheme","award":["N_HKBU214\/21"],"award-info":[{"award-number":["N_HKBU214\/21"]}]},{"name":"RGC General Research Fund","award":["12201321"],"award-info":[{"award-number":["12201321"]}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61672444"],"award-info":[{"award-number":["61672444"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001747","name":"Hong Kong Baptist University","doi-asserted-by":"publisher","award":["RC-FNRA-IG\/18-19\/SCI\/03"],"award-info":[{"award-number":["RC-FNRA-IG\/18-19\/SCI\/03"]}],"id":[{"id":"10.13039\/501100001747","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001747","name":"Hong Kong Baptist University","doi-asserted-by":"publisher","award":["RC-IRCMs\/18-19\/SCI\/01"],"award-info":[{"award-number":["RC-IRCMs\/18-19\/SCI\/01"]}],"id":[{"id":"10.13039\/501100001747","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Innovation and Technology Fund of Innovation and Technology Commission, Government of the Hong Kong Special Administrative Region","award":["ITS\/339\/18"],"award-info":[{"award-number":["ITS\/339\/18"]}]},{"name":"Startup Funding"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tifs.2022.3164215","type":"journal-article","created":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T19:49:52Z","timestamp":1648842592000},"page":"1544-1557","source":"Crossref","is-referenced-by-count":19,"title":["A Unified Framework for Bidirectional Prototype Learning From Contaminated Faces Across Heterogeneous Domains"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7184-2043","authenticated-orcid":false,"given":"Meng","family":"Pang","sequence":"first","affiliation":[{"name":"School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5616-060X","authenticated-orcid":false,"given":"Binghui","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Illinois Institute of Technology, Chicago, IL, USA"}]},{"given":"Siyu","family":"Huang","sequence":"additional","affiliation":[{"name":"John A. Paulson School of Engineering and Applied Sciences, Harvard University, Boston, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7629-4648","authenticated-orcid":false,"given":"Yiu-Ming","family":"Cheung","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Hong Kong Baptist University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6874-6453","authenticated-orcid":false,"given":"Bihan","family":"Wen","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, Singapore"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2016.09.001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3052549"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3071119"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199750"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00022"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2651375"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2788002"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916633"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3031386"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3120054"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/179"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.07.058"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3065495"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3061286"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00532"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.39"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206832"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6247788"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2012.2198090"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.11.008"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.720"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.12291"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00795"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107249"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58545-7_46"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2985099"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3240508.3240612"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2017.8296472"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3050055"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1126\/science.290.5500.2323"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.222"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2015.7301308"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10599-4_51"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-020-09835-4"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2671188.2749321"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3156\/jsoft.29.5_177_2"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2869574"},{"key":"ref40","first-page":"700","article-title":"Unsupervised image-to-image translation networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NIPs)","author":"Liu"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/143"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2675341"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2004.1333724"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.267"},{"issue":"1","key":"ref45","first-page":"723","article-title":"A kernel two-sample test","volume":"13","author":"Gretton","year":"2012","journal-title":"J. Mach. Learn. Res."},{"key":"ref46","article-title":"The BUAA-VisNir face database instructions","volume":"6","author":"Huang","year":"2012"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2013.59"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2715660"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995324"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/34.879790"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.141"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2833032"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46487-9_6"},{"key":"ref54","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv:1412.6980"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2215617"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2390414"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2517014"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2651380"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2016.7550064"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10786"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2885284"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3013186"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.12226"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2872675"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2957285"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(99)00139-9"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5540018"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.230"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2016.7477558"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9652463\/09745912.pdf?arnumber=9745912","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T00:31:01Z","timestamp":1705537861000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9745912\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":69,"URL":"https:\/\/doi.org\/10.1109\/tifs.2022.3164215","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}