{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:19:49Z","timestamp":1743139189846,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031202322"},{"type":"electronic","value":"9783031202339"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20233-9_17","type":"book-chapter","created":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T00:02:48Z","timestamp":1667433768000},"page":"169-179","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Learning Optimal Transport Mapping of\u00a0Joint Distribution for\u00a0Cross-scenario Face Anti-spoofing"],"prefix":"10.1007","author":[{"given":"Shiyun","family":"Mao","sequence":"first","affiliation":[]},{"given":"Ruolin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Huibin","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,3]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Komulainen J, Hadid A, Pietik\u00e4inen M: Context based face anti-spoofing. In: In: IEEE Sixth International Conference on Biometrics, pp. 1\u20138 (2013)","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"2268","DOI":"10.1109\/TIFS.2016.2578288","volume":"11","author":"K Patel","year":"2016","unstructured":"Patel, K., Han, H., Jain, A.K.: Secure face unlock: spoof detection on smartphones. IEEE Trans. Inf. Forensics Secur. 11, 2268\u20132283 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2019.103858","volume":"94","author":"YAU Rehman","year":"2020","unstructured":"Rehman, Y.A.U., Po, L.M., Komulainen, J.: Enhancing deep discriminative feature maps via perturbation for face presentation attack detection. Image Vis. Comput. 94, 103858 (2020)","journal-title":"Image Vis. Comput."},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"1880","DOI":"10.1049\/iet-ipr.2018.5560","volume":"13","author":"M Khammari","year":"2019","unstructured":"Khammari, M.: Robust face anti-spoofing using CNN with LBP and WLD. IET Image Proc. 13, 1880\u20131884 (2019)","journal-title":"IET Image Proc."},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Liu, Y., Jourabloo, A., Liu, X.: Learning deep models for face anti-spoofing: binary or auxiliary supervision. In: CVPR, pp. 389\u2013398 (2018)","DOI":"10.1109\/CVPR.2018.00048"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Yu Z, Zhao C, Wang Z, et al.: Searching central difference convolutional networks for face anti-spoofing. In: CVPR, pp. 5295\u20135305 (2020)","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/TBIOM.2020.2973001","volume":"2","author":"S Zhang","year":"2020","unstructured":"Zhang, S., Liu, A., Wan, J., et al.: Casia-surf: a large-scale multi-modal benchmark for face anti-spoofing. IEEE Trans. Biometrics Beh. Identity Sci. 2, 182\u2013193 (2020)","journal-title":"IEEE Trans. Biometrics Beh. Identity Sci."},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Pei, Z., Cao, Z., Long, M., et al.: Multi-adversarial domain adaptation. In: AAAI (2018)","DOI":"10.1609\/aaai.v32i1.11767"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-030-30671-7_6","volume-title":"Domain Adaptation for Visual Understanding","author":"MM Rahman","year":"2020","unstructured":"Rahman, M.M., Fookes, C., Baktashmotlagh, M., Sridharan, S.: On minimum discrepancy estimation for deep domain adaptation. In: Singh, R., Vatsa, M., Patel, V.M., Ratha, N. (eds.) Domain Adaptation for Visual Understanding, pp. 81\u201394. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-30671-7_6"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-319-49409-8_35","volume-title":"Computer Vision \u2013 ECCV 2016 Workshops","author":"B Sun","year":"2016","unstructured":"Sun, B., Saenko, K.: Deep CORAL: correlation alignment for deep domain adaptation. In: Hua, G., J\u00e9gou, H. (eds.) ECCV 2016. LNCS, vol. 9915, pp. 443\u2013450. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49409-8_35"},{"key":"17_CR11","unstructured":"Zhuang, F., Cheng, X., Luo, P., et al.: Supervised representation learning: transfer learning with deep autoencoders. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Tzeng, E., Hoffman, J., Saenko, K., et al.: Adversarial discriminative domain adaptation. In: CVPR, pp. 7167\u20137176 (2017)","DOI":"10.1109\/CVPR.2017.316"},{"key":"17_CR13","first-page":"1794","volume":"13","author":"H Li","year":"2018","unstructured":"Li, H., Li, W., Cao, H., et al.: Unsupervised domain adaptation for face anti-spoofing. ITFS 13, 1794\u20131809 (2018)","journal-title":"ITFS"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Tzeng E, Hoffman J, Saenko K, et al.: Adversarial discriminative domain adaptation. In: CVPR, pp. 7167\u20137176 (2017)","DOI":"10.1109\/CVPR.2017.316"},{"key":"17_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107888","volume":"115","author":"Y Jia","year":"2021","unstructured":"Jia, Y., Zhang, J., Shan, S., et al.: Unified unsupervised and semi-supervised domain adaptation network for cross-scenario face anti-spoofing. Pattern Recogn. 115, 107888 (2021)","journal-title":"Pattern Recogn."},{"key":"17_CR16","unstructured":"Cuturi, M., Doucet, A.: Fast computation of wasserstein barycenters. In: International Conference on Machine Learning. PMLR, pp. 685\u2013693 (2014)"},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/978-3-030-01225-0_28","volume-title":"Computer Vision \u2013 ECCV 2018","author":"BB Damodaran","year":"2018","unstructured":"Damodaran, B.B., Kellenberger, B., Flamary, R., Tuia, D., Courty, N.: DeepJDOT: deep joint distribution optimal transport for unsupervised domain adaptation. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11208, pp. 467\u2013483. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01225-0_28"},{"key":"17_CR18","unstructured":"Cuturi, M.: Sinkhorn distances: lightspeed computation of optimal transport. In: Advances in Neural Information Processing Systems, pp. 2292\u20132300 (2013)"},{"key":"17_CR19","unstructured":"Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. BIOSIG, pp. 1\u20137 (2012)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yan, J., Liu, S., et al.: A face antispoofing database with diverse attacks. In: ICB, pp. 26\u201331 (2012)","DOI":"10.1109\/ICB.2012.6199754"},{"key":"17_CR21","first-page":"746","volume":"10","author":"D Wen","year":"2015","unstructured":"Wen, D., Han, H., Jain, A.K.: Face spoof detection with image distortion analysis. TIFS 10, 746\u2013761 (2015)","journal-title":"TIFS"},{"key":"17_CR22","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang, K., Zhang, Z., Li, Z., et al.: Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process. Lett. 23, 1499\u20131503 (2016)","journal-title":"IEEE Signal Process. Lett."},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., et al.: Deep residual learning for image recognition. In: CVPR, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"17_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1007\/978-3-319-46493-0_36","volume-title":"Computer Vision \u2013 ECCV 2016","author":"M Ghifary","year":"2016","unstructured":"Ghifary, M., Kleijn, W.B., Zhang, M., Balduzzi, D., Li, W.: Deep reconstruction-classification networks for unsupervised domain adaptation. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9908, pp. 597\u2013613. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46493-0_36"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Hu, L., Kan, M., Shan, S., et al.: Duplex generative adversarial network for unsupervised domain adaptation. In: CVPR, pp. 1498\u20131507 (2018)","DOI":"10.1109\/CVPR.2018.00162"},{"key":"17_CR26","first-page":"2579","volume":"9","author":"L Van der Maaten","year":"2008","unstructured":"Van der Maaten, L., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9, 2579\u20132605 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"17_CR27","first-page":"56","volume":"16","author":"G Wang","year":"2021","unstructured":"Wang, G., Han, H., Shan, S., Chen, X.: Unsupervised adversarial domain adaptation for cross-domain face presentation attack detection. TIFS 16, 56\u201369 (2021)","journal-title":"TIFS"},{"key":"17_CR28","first-page":"2137","volume":"17","author":"Z Li","year":"2022","unstructured":"Li, Z., Cai, R., Li, H., Lam, K.-Y., Hu, Y., Kot, A.C.: One-class knowledge distillation for face presentation attack detection. TIFS 17, 2137\u20132150 (2022)","journal-title":"TIFS"},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"Zhou, Q., et al.: Adaptive mixture of experts learning for generalizable face anti-spoofing. ACM MM (2022)","DOI":"10.1145\/3503161.3547769"},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Zhou, et al.: Generative domain adaptation for face anti-spoofin. In: ECCV (2022)","DOI":"10.1007\/978-3-031-20065-6_20"},{"key":"17_CR31","doi-asserted-by":"crossref","unstructured":"Chen, Z., et al.: Generalizable representation learning for mixture domain face anti-spoofing. In: AAAI, pp. 1132\u20131139 (2021)","DOI":"10.1609\/aaai.v35i2.16199"},{"key":"17_CR32","first-page":"1853","volume":"39","author":"R Flamary","year":"2016","unstructured":"Flamary, R., Courty, N., Tuia, D., et al.: Optimal transport for domain adaptation. IEEE Trans. Pattern Anal. Mach. Intell. 39, 1853\u20131865 (2016)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."}],"container-title":["Lecture Notes in Computer Science","Biometric Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20233-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T00:26:28Z","timestamp":1667435188000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20233-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031202322","9783031202339"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20233-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"3 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CCBR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Biometric Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccbr2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ccbr99.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"70","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"61% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}