1. [1] Huble, D. H., & Wiesel, T. N. (1968). Receptive fields and functional architecture of monkey striate cortex. The Journal of Physiology, 215-243.
2. [2] Cohen, A. I. (1972). Rods and Cones. In Physiology of Photoreceptor Organs (pp. 63-110). Springer Berlin Heidelberg.
3. [3] Panchal, G., Amit, G., P., K. Y., & Devyani, P. (2011). Behaviour Analysis of Multilayer Perceptronswith Multiple Hidden Neurons and Hidden Layers. International Journal of Computer Theory and Engineering, 332-337.
4. [4] LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521, 436-444.
5. [5] D. A. R. Wati and D. Abadianto, "Design of face detection and recognition system for smart home security application," 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE),
6. 2017, pp. 342-347, doi: 10.1109/ICITISEE.2017.8285524.
7. [6] D. A. Chowdhry, A. Hussain, M. Z. Ur Rehman, F. Ahmad, A. Ahmad and M. Pervaiz, "Smart security system for sensitive area using face recognition," 2013 IEEE Conference on Sustainable Utilization and Development in Engineering and
8. Technology (CSUDET), 2013, pp. 11-14, doi: 10.1109/CSUDET.2013.6670976.
9. [7] Ciresan, D. C., Meier, U., Masci, J., Maria Gambardella, L., & Schmidhuber, J. (2011). Flexible, high performance convolutional neural networks for image classification. the International Joint Conference on Artificial Intelligence (pp.
10. 1242). California: AAAI Press. [8] Lecun, Y., Bottou, L., Bengio, Y., & Haffner, P. (1998). Gradient-based learning applied to document recognition. in Proceedings of the IEEE, 86(11), 2278-2324.
11. [9] LeCun, Y., Boser, B., Denker, J. S., Henderson, D., Howard, R. E., Hubbard, W., et al. (1989). Handwritten digit recognition with a back-propagation network. Advances in neural information processing systems, 396-404.
12. [10] Hinton, G. E., & Salakhutdinov, R. R. (2006). Reducing the dimensionality of data with neural networks. Science,313(5786), 504-507.
13. [11] Bengio, Y., Lamblin, P., Popovici, D., & Larochelle, H. (2006).Greedy layer-wise training of deep networks. Advances in neural information processing systems, 2814-2822.
14. [12] Krizhevsky, A., Sutskever, I., & Hinton, G. (2012). ImageNet classification with deep convolutional neural networks.Advances in neural information processing systems, 25.
15. [13] Deng, L. (2014). A tutorial survey of architectures, algorithms, and applications for deep learning. APSIPA Transactions on Signal and Information Processing, 3(2), 1-29.
16. [14] Russakovsky, O., Deng, J., Su, H., Krause, J., Satheesh, S., Ma, S., et al. (2015). ImageNet large scale visual recognition challenge. International Journal of Computer Vision, 115(3),211-252.
17. Volume 15- Number 1 - 2023 (16 -23) 22
18. [15] Simonyan, K., & Zisserman. (2014). Very deep convolutional networks for large-scale image recognition. ICLR.
19. [16] Zeiler, M. D., & Fergus, R. (2013). Stochastic Pooling for Regularization of Deep Convolutional Neural Networks.arXiv:1301.3557.
20. [17] Gong, Y., Wang, L., Guo, R., & Lazebnik, S. (2014). Multiscale orderless pooling of deep convolutional activation features. the European Conference on Computer Vision (pp.392-407). Berlin: Springer.
21. [18] Szegedy, C., Ioffe, S., & Vanhoucke, V. (2016). Inception-v4,Inception-Resnet and the impact of residual connections on learning. arXiv 1602.07261.
22. [19] He, K., Zhang, X., Ren, S., & Sun, J. (2015). Deep residual learning for image recognition. arXiv 1512.03385.
23. [20] Zhao, Q., & Griffin, L. D. (2016). Suppressing the unusual: Towards robust CNNs using symmetric activation functions .arXiv 1603.05145v1.
24. [21] Tang, Y. (2013). Deep learning using linear support vector machines. arXiv 1306.0239.
25. [22] Hinton, G. E., Srivastava, N., Krizhevsky, A., Sutskever, I., & Salakhutdinov, R. R. (2012). Improving neural networks by preventing co-adaptation of feature detectors. arXiv1207.0580.
26. [23] Taigman, Y., Yang, M., Ranzato, M., & Wolf, L. (2014). DeepFace: Closing the Gap to Human-Level Performance in Face Verification. IEEE Conference on Computer Vision and Pattern Recognition, (pp. 1701-1708). Columbus.
27. [24] Bengio, Y. (2009). Learning deep architectures for AI.Foundations and Trends in Machine Learning, 2(1), 1-127.
28. [25] Schmidhuber, J. (2015). Deep learning in neural networks: An overview. Neural Networks, 61, 85-117.
29. [26] Deng, L., & Yu, D. (2014). Deep learning: Methods and applications. Foundations and Trends in Signal Processing,197-387.
30. [27] Hubel, D. H. (1959). Receptive fields of single neurones in the cat's striate cortex. Journal of Physiology, 148(1), 574-591.
31. [28] Hubel, D. H. (1962). Receptive fields, binocular interaction and functional architecture in the cat's visual cortex. Journal of Physiology, 160(1), 106-154.
32. [29] Yu, D., Wang, H., Chen, P., & Wei, Z. (2014). Mixed pooling for convolutional neural networks. the 9th International Conference on Rough Sets and Knowledge Technology (pp.364-375). Berlin: Springer.
33. [30] Nair, V., & Hinton, G. E. (2010). Rectified linear units improve restricted Boltzmann machines. the 27th international conference on machine learning, (pp. 807-814).
34. [31] Thikshaja, U. K., & Paul, A. (2017). A Brief Review on Deep Learning and Types of Implementation for Deep Learning. In S. Karthik, A. Paul, & N. Karthikeyan, Deep Learning Innovations and Their Convergence With Big Data (pp. 20-32).
35. IGI Global.
36. [32] Yu, W., Yang, K., Bai, Y., Yao, H., & Rui, Y. (2014). Visualizing and Comparing Convolutional Neural Networks. Computer Vision and Pattern Recognition.
37. [33] Srinivas, S., Sarvadevabhatla, R. K., Mopuri, K. R., Prabhu, N.,Kruthiventi, S. S., & Babu, R. V. (2016). A taxonomy of deep convolutional neural nets for computer vision. Frontiers in Robotics and AI .
38. [34] Buduma, N. (2017). Fundamentals of Deep Learning. O'Reilly Media, Inc.
39. [35] Denyer, S. (2018). Beijing bets on facial recognition in a big drive for total surveillance. washingtonpost.
40. [36] Wiatowski, T., & Bölcskei, H. (2018). A mathematical theory of deep convolutional neural networks for feature extraction.IEEE Transactions on Information Theory, 64(3), 1845-1866.
41. [37] Scherhag, U., Rathgeb, C., Merkle, J., Breithaupt, R., & Busch, C. (2019). Face Recognition Systems Under Morphing Attacks: A Survey. IEEE Access, 7, 23012-23026.
42. [38] F. Schroff, D. Kalenichenko and J. Philbin, "FaceNet: A Unified Embedding for Face Recognition and Clustering", 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 815-823, 2015.
43. [39] I. William, D. R. Ignatius Moses Setiadi, E. H. Rachmawanto, H. A. Santoso and C. A. Sari, "Face Recognition using FaceNet (Survey, Performance Test, and Comparison)," 2019 Fourth
44. International Conference on Informatics and Computing (ICIC), 2019, pp. 1-6, doi: 10.1109/ICIC47613.2019.8985786 [40] D. Yi, Z. Lei, S. Liao, and S. Z. Li, "Learning Face Representation from Scratch," 2014.
45. [41] Q. Cao, L. Shen, W. Xie, O. M. Parkhi and A. Zisserman, "VGGFace2: A dataset for recognising faces across pose and age," International Conference on Automatic Face and Gesture Recognition, 2018.