{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:31:06Z","timestamp":1753601466261,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1109\/iwbf49977.2020.9107958","type":"proceedings-article","created":{"date-parts":[[2020,6,4]],"date-time":"2020-06-04T20:31:04Z","timestamp":1591302664000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Secure Triplet Loss for End-to-End Deep Biometrics"],"prefix":"10.1109","author":[{"given":"Joao Ribeiro","family":"Pinto","sequence":"first","affiliation":[]},{"given":"Jaime S.","family":"Cardoso","sequence":"additional","affiliation":[]},{"given":"Miguel V.","family":"Correia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2015.7133169"},{"key":"ref30","first-page":"176","article-title":"A comparison of multivariate mutual information estimators for feature selection","author":"doquire","year":"2012","journal-title":"Proceedings of the 1st International Conference on Pattern Recognition Applications and Methods - Volume 1 ICPRAM"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","article-title":"Biohashing: two factor authentication featuring fingerprint data and tokenised random number","volume":"37","author":"teoh","year":"2004","journal-title":"Pattern Recognition"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1073170.1073191"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2017.10.003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553053"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26972-2_15"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2017.8308652"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.17"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1201\/9781351013437-11"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1109\/BTAS46853.2019.9185990","article-title":"A end-to-end convolutional neural network for ECG based biometric authentication","author":"pinto","year":"2019","journal-title":"10th IEEE International Conference on Biometrics Theory Applications and Systems (BTAS 2019)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2876838"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"66138","DOI":"10.1103\/PhysRevE.69.066138","article-title":"Estimating mutual information","volume":"69","author":"kraskov","year":"2004","journal-title":"Phys Rev E"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2427849"},{"key":"ref27","first-page":"9","article-title":"Sample estimate of the entropy of a random vector","volume":"23","author":"kozachenko","year":"1987","journal-title":"Problemy Peredachi Informatsii"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2849870"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(17)30138-8"},{"article-title":"Entropy estimators","year":"2017","author":"brodersen","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.06.046"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2015.0045"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1561\/0100000051"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77326-1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891817"},{"key":"ref22","first-page":"1109","article-title":"Large scale online learning of image similarity through ranking","volume":"11","author":"chechik","year":"2010","journal-title":"Journal of Machine Learning Research"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/EMBC.2017.8036860"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.149"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.145"},{"year":"2010","key":"ref26","article-title":"Normalized square euclidean distance"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2360430"}],"event":{"name":"2020 8th International Workshop on Biometrics and Forensics (IWBF)","start":{"date-parts":[[2020,4,29]]},"location":"Porto, Portugal","end":{"date-parts":[[2020,4,30]]}},"container-title":["2020 8th International Workshop on Biometrics and Forensics (IWBF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9105916\/9107938\/09107958.pdf?arnumber=9107958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:54:06Z","timestamp":1656453246000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9107958\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/iwbf49977.2020.9107958","relation":{},"subject":[],"published":{"date-parts":[[2020,4]]}}}