{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T10:36:10Z","timestamp":1760524570124,"version":"3.41.0"},"reference-count":49,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2024,2,8]],"date-time":"2024-02-08T00:00:00Z","timestamp":1707350400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61976189, and 62276236"],"award-info":[{"award-number":["61976189, and 62276236"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Leading Innovation Team of Zhejiang Province","award":["2021R01002"],"award-info":[{"award-number":["2021R01002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Asian Low-Resour. Lang. Inf. Process."],"published-print":{"date-parts":[[2024,2,29]]},"abstract":"<jats:p>Chinese characters are complex and contain discriminative information, meaning that their writers have the potential to be recognized using less text. In this study, offline Chinese writer identification based on a single character was investigated. To extract comprehensive features to model Chinese characters, explicit and implicit information as well as global and local features are of interest. A dual-branch multitask fusion network is proposed that contains two branches for global and local feature extraction simultaneously, and introduces auxiliary tasks to help the main task. Content recognition, stroke number estimation, and stroke recognition are considered as three auxiliary tasks for explicit information. The main task extracts implicit information of writer identity. The experimental results validated the positive influences of auxiliary tasks on the writer identification task, with the stroke number estimation task being most helpful. In-depth research was conducted to investigate the influencing factors in Chinese writer identification, with respect to character complexity, stroke importance, and character number, which provides a systematic reference for the actual application of neural networks in Chinese writer identification.<\/jats:p>","DOI":"10.1145\/3638554","type":"journal-article","created":{"date-parts":[[2023,12,26]],"date-time":"2023-12-26T20:43:56Z","timestamp":1703623436000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Dual-Branch Multitask Fusion Network for Offline Chinese Writer Identification"],"prefix":"10.1145","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2378-2725","authenticated-orcid":false,"given":"Haixia","family":"Wang","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5433-7986","authenticated-orcid":false,"given":"Yingyu","family":"Mao","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Zhejiang University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9458-1101","authenticated-orcid":false,"given":"Qingran","family":"Miao","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5433-7986","authenticated-orcid":false,"given":"Qun","family":"Xiao","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1510-5097","authenticated-orcid":false,"given":"Yilong","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2024,2,8]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2009.222"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10032-017-0289-3"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.11.029"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.09.044"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2871267"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2823276"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.05.001"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.10.005"},{"issue":"2","key":"e_1_3_1_10_2","first-page":"142","article-title":"Writer identification for Chinese handwriting","volume":"2","author":"Leng Wong Yee","year":"2010","unstructured":"Wong Yee Leng and Siti Mariyam Shamsuddin. 2010. Writer identification for Chinese handwriting. Int. J. Advance. Soft Comput. Appl. 2, 2 (July 2010), 142\u2013173.","journal-title":"Int. J. Advance. Soft Comput. Appl."},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.08.017"},{"key":"e_1_3_1_12_2","first-page":"145","volume-title":"Proceedings of the 2017 1st ASAR","author":"Maliki Makki","year":"2017","unstructured":"Makki Maliki, Naseer Al-Jawad, and Sabah Jassim. 2017. Offline writer identification for Arabic language: Analysis and classification techniques using subwords features. In Proceedings of the 2017 1st ASAR. 145\u2013152."},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDARW.2019.50113"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(99)00006-0"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.11.026"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2013.03.020"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIP.2010.5697457"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2008.4761908"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.11.003"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.01.024"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107975"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2991880"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"e_1_3_1_25_2","unstructured":"Sebastian Ruder. 2017. An overview of multi-task learning in deep neural networks. Retrieved from https:\/\/arxiv.org\/abs\/1706.05098 (2021)."},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1009"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.09.017"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2981236"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.07.005"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2006.894"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-006-0047-5"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2013.92"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2010.05.019"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.10.027"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927286"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2301274"},{"key":"e_1_3_1_37_2","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1109\/ICPR.2000.906196","volume-title":"Proceedings of the 15th International Conference on Pattern Recognition (ICPR 2000)","volume":"02","author":"Zhu Yong","year":"2000","unstructured":"Yong Zhu, Tieniu Tan, and Yunhong Wang. 2000. Biometric personal identification based on handwriting. In Proceedings of the 15th International Conference on Pattern Recognition (ICPR 2000), 02 (2000). 797\u2013800."},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2007.10.017"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025528"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICFHR.2016.0112"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00591"},{"key":"e_1_3_1_42_2","unstructured":"S. Hwang and H. E. Kim. 2016. Self-transfer learning for fully weakly supervised object localization. Retrieved from https:\/\/arxiv.org\/abs\/1602.01625 (2021)"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10599-4_7"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2011.17"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2013.117"},{"key":"e_1_3_1_46_2","unstructured":"D. P. Kingma and J. Ba. 2014. Adam: A method for stochastic optimization. Retrieved from https:\/\/arxiv.org\/abs\/1412.6980 (2021)."},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"volume-title":"Proceedings of the 2019 International Conference on Machine Learning (PMLR'19)","key":"e_1_3_1_48_2","unstructured":"Mingxing Tan and Le Quoc. 2019. EfficientNet: Rethinking model scaling for convolutional neural networks. In Proceedings of the 2019 International Conference on Machine Learning (PMLR'19). 6105--6114."},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.30630\/joiv.7.1.1293"},{"first-page":"1","volume-title":"Proceedings of the 2021 ICLR","key":"e_1_3_1_50_2","unstructured":"Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov, Dirk Weissenborn, Xiaohua Zhai, Thomas Unterthiner, Mostafa Dehghani, Matthias Minderer, Georg Heigold, Sylvain Gelly, Jakob Uszkoreit, and Neil Houlsby. 2021. An image is worth 16\u00d716 words: transformers for image recognition at scale. In Proceedings of the 2021 ICLR. 1\u201322."}],"container-title":["ACM Transactions on Asian and Low-Resource Language Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638554","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3638554","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:13Z","timestamp":1750291573000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638554"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,8]]},"references-count":49,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,2,29]]}},"alternative-id":["10.1145\/3638554"],"URL":"https:\/\/doi.org\/10.1145\/3638554","relation":{},"ISSN":["2375-4699","2375-4702"],"issn-type":[{"type":"print","value":"2375-4699"},{"type":"electronic","value":"2375-4702"}],"subject":[],"published":{"date-parts":[[2024,2,8]]},"assertion":[{"value":"2022-08-03","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-12-14","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-02-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}