{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T06:27:04Z","timestamp":1723444024830},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1109\/isba.2016.7477226","type":"proceedings-article","created":{"date-parts":[[2016,5,26]],"date-time":"2016-05-26T20:26:45Z","timestamp":1464294405000},"source":"Crossref","is-referenced-by-count":7,"title":["Robust transgender face recognition: Approach based on appearance and therapy factors"],"prefix":"10.1109","author":[{"given":"Vijay","family":"Kumar","sequence":"first","affiliation":[]},{"given":"R.","family":"Raghavendra","sequence":"additional","affiliation":[]},{"given":"Anoop","family":"Namboodiri","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Busch","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1874249"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000013087.49260.fb"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.79"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126277"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712710"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2361479"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025064"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2361479"},{"key":"ref8","article-title":"Accurate face detection in video based on likelihood assessment","author":"raghavendra","year":"2012","journal-title":"Norsk informasjonssikkerhet-skonferanse (NISK)"},{"key":"ref7","first-page":"1","article-title":"Robust 2D\/3D face mask presentation attack detection scheme by exploring multiple features and comparison score level fusion","author":"raghavendra","year":"2014","journal-title":"17th International Conference on Information Fusion (FUSION) FUSION"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.357"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612994"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2054083"}],"event":{"name":"2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","location":"Sendai","start":{"date-parts":[[2016,2,29]]},"end":{"date-parts":[[2016,3,2]]}},"container-title":["2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7469604\/7477224\/07477226.pdf?arnumber=7477226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,28]],"date-time":"2016-09-28T20:51:13Z","timestamp":1475095873000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7477226\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/isba.2016.7477226","relation":{},"subject":[],"published":{"date-parts":[[2016,2]]}}}