{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:21Z","timestamp":1750220901247,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T00:00:00Z","timestamp":1575590400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,6]]},"DOI":"10.1145\/3374587.3374607","type":"proceedings-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T18:16:31Z","timestamp":1583345791000},"page":"343-346","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Real-time Target Tracking Based on PCANet-CSK Algorithm"],"prefix":"10.1145","author":[{"given":"Zhenghua","family":"Hu","sequence":"first","affiliation":[{"name":"School of Computer and Communication Engineering University of Science and Technology Beijing, Beijing, China"}]},{"given":"Xianmei","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering University of Science and Technology Beijing, Beijing, China"}]},{"given":"Kangming","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering University of Science and Technology Beijing, Beijing, China"}]},{"given":"Pu","family":"Dong","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences"}]}],"member":"320","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Exploiting the circulant structure of tracking-by-detection with kernels","author":"Jo\u00e3o F.","year":"2012","unstructured":"Jo\u00e3o F. Henriques , Caseiro, R., Martins , P. , & Batista , J. ( 2012 ). Exploiting the circulant structure of tracking-by-detection with kernels . Jo\u00e3o F. Henriques, Caseiro, R., Martins, P., & Batista, J. (2012). Exploiting the circulant structure of tracking-by-detection with kernels."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2345390"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.239"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126251"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2354409.2354886"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2354409.2354884"},{"key":"e_1_3_2_1_7_1","volume-title":"International Conference on Computer Vision.","author":"Kwon J.","year":"2011","unstructured":"Kwon , J. , & Lee , K. M. ( 2011 ). Tracking by Sampling Trackers . International Conference on Computer Vision. Kwon, J., & Lee, K. M. (2011). Tracking by Sampling Trackers. International Conference on Computer Vision."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2475625"},{"key":"e_1_3_2_1_9_1","volume-title":"Learning multi-domain convolutional neural networks for visual tracking","author":"Nam H.","year":"2015","unstructured":"Nam , H. , & Han , B. ( 2015 ). Learning multi-domain convolutional neural networks for visual tracking . Nam, H., & Han, B. (2015). Learning multi-domain convolutional neural networks for visual tracking."},{"key":"e_1_3_2_1_10_1","volume-title":"Visual Tracking with Fully Convolutional Networks. 2015 IEEE International Conference on Computer Vision (ICCV). IEEE.","author":"Wang L.","year":"2016","unstructured":"Wang , L. , Ouyang , W. , Wang , X. , & Lu , H. ( 2016 ). Visual Tracking with Fully Convolutional Networks. 2015 IEEE International Conference on Computer Vision (ICCV). IEEE. Wang, L., Ouyang, W., Wang, X., & Lu, H. (2016). Visual Tracking with Fully Convolutional Networks. 2015 IEEE International Conference on Computer Vision (ICCV). IEEE."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2012.231"},{"key":"e_1_3_2_1_12_1","volume-title":"ImageNet Classification with Deep Convolutional Neural Networks. NIPS (Vol.25)","author":"Krizhevsky A.","year":"2012","unstructured":"Krizhevsky , A. , Sutskever , I. , & Hinton , G. ( 2012 ). ImageNet Classification with Deep Convolutional Neural Networks. NIPS (Vol.25) . Curran Associates Inc . Krizhevsky, A., Sutskever, I., & Hinton, G. (2012). ImageNet Classification with Deep Convolutional Neural Networks. NIPS (Vol.25). Curran Associates Inc."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539960"},{"key":"e_1_3_2_1_14_1","volume-title":"Accurate Scale Estimation for Robust Visual Tracking. British Machine Vision Conference.","author":"Danelljan M.","year":"2014","unstructured":"Danelljan , M. , H\u00e4ger , G. , Khan , F. S. , & Felsberg , M. ( 2014 ). Accurate Scale Estimation for Robust Visual Tracking. British Machine Vision Conference. Danelljan, M., H\u00e4ger, G., Khan, F. S., & Felsberg, M. (2014). Accurate Scale Estimation for Robust Visual Tracking. British Machine Vision Conference."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.510"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995733"},{"key":"e_1_3_2_1_17_1","volume-title":"Visual tracking decomposition. Computer Vision & Pattern Recognition","author":"Kwon J.","year":"2010","unstructured":"Kwon , J. , & Lee , K. M. ( 2010 ). Visual tracking decomposition. Computer Vision & Pattern Recognition . Kwon, J., & Lee, K. M. (2010). Visual tracking decomposition. Computer Vision & Pattern Recognition."}],"event":{"name":"CSAI2019: 2019 3rd International Conference on Computer Science and Artificial Intelligence","sponsor":["Shenzhen University Shenzhen University"],"location":"Normal IL USA","acronym":"CSAI2019"},"container-title":["Proceedings of the 2019 3rd International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374587.3374607","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374587.3374607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:44Z","timestamp":1750203884000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374587.3374607"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,6]]},"references-count":17,"alternative-id":["10.1145\/3374587.3374607","10.1145\/3374587"],"URL":"https:\/\/doi.org\/10.1145\/3374587.3374607","relation":{},"subject":[],"published":{"date-parts":[[2019,12,6]]},"assertion":[{"value":"2020-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}