{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:58:52Z","timestamp":1725987532075},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319979083"},{"type":"electronic","value":"9783319979090"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-97909-0_36","type":"book-chapter","created":{"date-parts":[[2018,8,8]],"date-time":"2018-08-08T00:02:46Z","timestamp":1533686566000},"page":"331-339","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Sensitive Information of Deep Learning Based Face Anti-spoofing Algorithms"],"prefix":"10.1007","author":[{"given":"Yukun","family":"Ma","sequence":"first","affiliation":[]},{"given":"Lifang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Jian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,9]]},"reference":[{"issue":"8","key":"36_CR1","doi-asserted-by":"publisher","first-page":"1818","DOI":"10.1109\/TIFS.2016.2555286","volume":"11","author":"Z Boulkenafet","year":"2017","unstructured":"Boulkenafet, Z., Komulainen, J., Hadid, A.: Face spoofing detection using colour texture analysis. IEEE Trans. Inf. Forensics Secur. 11(8), 1818\u20131830 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"36_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1049\/iet-bmt.2011.0009","volume":"1","author":"J Maatta","year":"2012","unstructured":"Maatta, J., Hadid, A., Pietikainen, M.: Face spoofing detection from single images using texture and local shape analysis. IET Biometrics 1(1), 3\u201310 (2012)","journal-title":"IET Biometrics"},{"key":"36_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/978-3-319-69923-3_57","volume-title":"Biometric Recognition","author":"L Wu","year":"2017","unstructured":"Wu, L., Xu, Y., Jian, M., Cai, W., Yan, C., Ma, Y.: Motion analysis based cross-database voting for face spoofing detection. In: Zhou, J., et al. (eds.) CCBR 2017. LNCS, vol. 10568, pp. 528\u2013536. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69923-3_57"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Li, L., Feng, X., Boulkenafet, Z., et al.: An original face anti-spoofing approach using partial convolutional neural network. In: International Conference on Image Processing Theory TOOLS and Applications, pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/IPTA.2016.7821013"},{"key":"36_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-319-59876-5_4","volume-title":"Image Analysis and Recognition","author":"O Lucena","year":"2017","unstructured":"Lucena, O., Junior, A., Moia, V., Souza, R., Valle, E., Lotufo, R.: Transfer learning using convolutional neural networks for face anti-spoofing. In: Karray, F., Campilho, A., Cheriet, F. (eds.) ICIAR 2017. LNCS, vol. 10317, pp. 27\u201334. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59876-5_4"},{"key":"36_CR6","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I.J., Fergus, R.: Intriguing properties of neural networks. In: ICLR, abs\/1312.6199 (2014)"},{"key":"36_CR7","first-page":"48","volume":"1","author":"B Yin","year":"2015","unstructured":"Yin, B., Wang, W., Wang, L.: Review of Deep Learning. J. Beijing Univ. Technol. 1, 48\u201359 (2015)","journal-title":"J. Beijing Univ. Technol."},{"issue":"6088","key":"36_CR8","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/B978-1-4832-1446-7.50035-2","volume":"323","author":"DE Rumelhart","year":"1988","unstructured":"Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning representations by back-propagating errors. Readings Cogn. Sci. 323(6088), 399\u2013421 (1988)","journal-title":"Readings Cogn. Sci."},{"key":"36_CR9","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: ICML, pp. 1\u201310 (2015)"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Moosavidezfooli, S.M., Fawzi, A., Frossard, P.: DeepFool: a simple and accurate method to fool deep neural networks. Computer Vision and Pattern Recognition. IEEE, pp. 2574\u20132582 (2016)","DOI":"10.1109\/CVPR.2016.282"},{"key":"36_CR11","unstructured":"Ma, Y., Wu, L., Jian, M., Liu, F., Yang, Z.: Approach to generate adversarial examples for face-spoofing detection. J. Softw. http:\/\/www.jos.org.cn\/jos\/ch\/reader\/view_abstract.aspx?file_no=5568"},{"key":"36_CR12","doi-asserted-by":"crossref","unstructured":"Anjos, A., Marcel, S.: Counter-measures to photo attacks in face recognition: a public database and a baseline. In: International Joint Conference on Biometrics, pp. 1\u20137. IEEE (2011)","DOI":"10.1109\/IJCB.2011.6117503"}],"container-title":["Lecture Notes in Computer Science","Biometric Recognition"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-97909-0_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T20:27:22Z","timestamp":1571689642000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-97909-0_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319979083","9783319979090"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-97909-0_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}