{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T11:42:04Z","timestamp":1768995724645,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":37,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819556274","type":"print"},{"value":"9789819556281","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5628-1_10","type":"book-chapter","created":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T21:29:41Z","timestamp":1768944581000},"page":"136-150","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Fair Face Presentation Attack Detection via\u00a0Adversarial Attribute Disentanglement"],"prefix":"10.1007","author":[{"given":"Wei","family":"Liu","sequence":"first","affiliation":[]},{"given":"Wenjun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Raoha Bin","family":"Mejba","sequence":"additional","affiliation":[]},{"given":"Meiling","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,21]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Abduh, L., Ivrissimtzis, I.: Race bias analysis of bona fide errors in face anti-spoofing. In: International Conference on Computer Analysis of Images and Patterns, pp. 23\u201332. Springer (2023)","DOI":"10.1007\/978-3-031-44240-7_3"},{"issue":"9","key":"10_CR2","doi-asserted-by":"publisher","first-page":"234","DOI":"10.3390\/fi13090234","volume":"13","author":"N Alshareef","year":"2021","unstructured":"Alshareef, N., Yuan, X., Roy, K., Atay, M.: A study of gender bias in face presentation attack and its mitigation. Future Internet 13(9), 234 (2021)","journal-title":"Future Internet"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Antil, A., Dhiman, C.: Unmasking deception: A comprehensive survey on the evolution of face anti-spoofing methods. Neurocomputing, p. 128992 (2024)","DOI":"10.1016\/j.neucom.2024.128992"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., Li, L., Feng, X., Hadid, A.: Oulu-npu: a mobile face presentation attack database with real-world variations. In: 2017 12th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2017), pp. 612\u2013618 (2017)","DOI":"10.1109\/FG.2017.77"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Boutros, F., Huber, M., Siebke, P., Rieber, T., Damer, N.: Sface: privacy-friendly and accurate face recognition using synthetic data. In: 2022 IEEE International Joint Conference on Biometrics (IJCB), pp. 1\u201311. IEEE (2022)","DOI":"10.1109\/IJCB54206.2022.10007961"},{"key":"10_CR6","unstructured":"Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG), pp.\u00a01\u20137 (2012)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: Imagenet: a large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248\u2013255. IEEE (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., Zafeiriou, S.: Arcface: additive angular margin loss for deep face recognition. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4685\u20134694 (2019)","DOI":"10.1109\/CVPR.2019.00482"},{"key":"10_CR9","first-page":"74366","volume":"36","author":"S Dooley","year":"2023","unstructured":"Dooley, S., Sukthanker, R., Dickerson, J., White, C., Hutter, F., Goldblum, M.: Rethinking bias mitigation: fairer architectures make for fairer face recognition. Adv. Neural. Inf. Process. Syst. 36, 74366\u201374393 (2023)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"10_CR10","unstructured":"Dosovitskiy, A., et\u00a0al.: An image is worth 16x16 words: transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)"},{"issue":"2","key":"10_CR11","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1109\/TTS.2020.2992344","volume":"1","author":"P Drozdowski","year":"2020","unstructured":"Drozdowski, P., Rathgeb, C., Dantcheva, A., Damer, N., Busch, C.: Demographic bias in biometrics: a survey on an emerging challenge. IEEE Trans. Technol. Soc. 1(2), 89\u2013103 (2020)","journal-title":"IEEE Trans. Technol. Soc."},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"1535","DOI":"10.1109\/TIFS.2023.3337970","volume":"19","author":"H Fang","year":"2024","unstructured":"Fang, H., Liu, A., Wan, J., Escalera, S., Zhao, C., Zhang, X., Li, S.Z., Lei, Z.: Surveillance face anti-spoofing. IEEE Trans. Inf. Forensics Secur. 19, 1535\u20131546 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Fang, M., Damer, N.: Face presentation attack detection by excavating causal clues and adapting embedding statistics. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 6269\u20136279 (2024)","DOI":"10.1109\/WACV57701.2024.00615"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Fang, M., Damer, N., Kirchbuchner, F., Kuijper, A.: Learnable multi-level frequency decomposition and hierarchical attention mechanism for generalized face presentation attack detection. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 3722\u20133731 (2022)","DOI":"10.1109\/WACV51458.2022.00120"},{"key":"10_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.110002","volume":"147","author":"M Fang","year":"2024","unstructured":"Fang, M., Yang, W., Kuijper, A., Struc, V., Damer, N.: Fairness in face presentation attack detection. Pattern Recogn. 147, 110002 (2024)","journal-title":"Pattern Recogn."},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Gong, S., Liu, X., Jain, A.K.: Mitigating face recognition bias via group adaptive classifier. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3414\u20133424 (2021)","DOI":"10.1109\/CVPR46437.2021.00342"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Huang, P.K., et\u00a0al.: A survey on deep learning-based face anti-spoofing. APSIPA Trans. Signal Inf. Process. 13(1) (2024)","DOI":"10.1561\/116.20240053"},{"key":"10_CR18","unstructured":"ISO\/IEC JTC 1\/SC 37 Biometrics: Information technology\u2013 Biometric presentation attack detection\u2013 Part 1: Frame work (2016)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Kotwal, K., Marcel, S.: Mitigating demographic bias in face recognition via regularized score calibration. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 1150\u20131159 (2024)","DOI":"10.1109\/WACVW60836.2024.00125"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Le, B.M., Woo, S.S.: Gradient alignment for cross-domain face anti-spoofing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 188\u2013199 (2024)","DOI":"10.1109\/CVPR52733.2024.00026"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Lin, X., Wang, S., Cai, R., Liu, Y., Fu, Y., Tang, W., Yu, Z., Kot, A.: Suppress and rebalance: Towards generalized multi-modal face anti-spoofing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 211\u2013221 (2024)","DOI":"10.1109\/CVPR52733.2024.00028"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Liu, A., Tan, Z., Wan, J., Escalera, S., Guo, G., Li, S.Z.: Casia-surf cefa: a benchmark for multi-modal cross-ethnicity face anti-spoofing. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV), pp. 1179\u20131187, January 2021","DOI":"10.1109\/WACV48630.2021.00122"},{"key":"10_CR23","doi-asserted-by":"publisher","first-page":"2497","DOI":"10.1109\/TIFS.2022.3188149","volume":"17","author":"A Liu","year":"2022","unstructured":"Liu, A., et al.: Contrastive context-aware learning for 3d high-fidelity mask face presentation attack detection. IEEE Trans. Inf. Forensics Secur. 17, 2497\u20132507 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Liu, Y., Jourabloo, A., Liu, X.: Learning deep models for face anti-spoofing: binary or auxiliary supervision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2018","DOI":"10.1109\/CVPR.2018.00048"},{"key":"10_CR25","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1109\/TIFS.2023.3326370","volume":"19","author":"X Long","year":"2023","unstructured":"Long, X., Zhang, J., Wu, S., Jin, X., Shan, S.: Dual sampling based causal intervention for face anti-spoofing with identity debiasing. IEEE Trans. Inf. Forensics Secur. 19, 851\u2013862 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR26","first-page":"12251","volume":"34","author":"S Mo","year":"2021","unstructured":"Mo, S., Kang, H., Sohn, K., Li, C.L., Shin, J.: Object-aware contrastive learning for debiased scene representation. Adv. Neural. Inf. Process. Syst. 34, 12251\u201312264 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Robinson, J.P., Livitz, G., Henon, Y., Qin, C., Fu, Y., Timoner, S.: Face recognition: too bias, or not too bias? In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp.\u00a00\u20131 (2020)","DOI":"10.1109\/CVPRW50498.2020.00008"},{"key":"10_CR28","first-page":"2798","volume":"33","author":"Y Savani","year":"2020","unstructured":"Savani, Y., White, C., Govindarajulu, N.S.: Intra-processing methods for debiasing neural networks. Adv. Neural. Inf. Process. Syst. 33, 2798\u20132810 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Sun, Y., Liu, Y., Liu, X., Li, Y., Chu, W.S.: Rethinking domain generalization for face anti-spoofing: Separability and alignment. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 24563\u201324574 (2023)","DOI":"10.1109\/CVPR52729.2023.02353"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Wang, H., Wang, Y., Zhou, Z., Ji, X., Gong, D., Zhou, J., Li, Z., Liu, W.: Cosface: Large margin cosine loss for deep face recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp. 5265\u20135274 (2018)","DOI":"10.1109\/CVPR.2018.00552"},{"issue":"4","key":"10_CR31","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"D Wen","year":"2015","unstructured":"Wen, D., Han, H., Jain, A.K.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forensics Secur. 10(4), 746\u2013761 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"10_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3705295","volume":"57","author":"S Yucer","year":"2024","unstructured":"Yucer, S., Tektas, F., Al Moubayed, N., Breckon, T.: Racial bias within face recognition: a survey. ACM Comput. Surv. 57(4), 1\u201339 (2024)","journal-title":"ACM Comput. Surv."},{"issue":"10","key":"10_CR33","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang, K., Zhang, Z., Li, Z., Qiao, Y.: Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process. Lett. 23(10), 1499\u20131503 (2016)","journal-title":"IEEE Signal Process. Lett."},{"key":"10_CR34","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-030-58610-2_5","volume-title":"Computer Vision - ECCV 2020","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., Yin, Z., Li, Y., Yin, G., Yan, J., Shao, J., Liu, Z.: Celeba-spoof: large-scale face anti-spoofing dataset with rich annotations. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.M. (eds.) Computer Vision - ECCV 2020, pp. 70\u201385. Springer, Cham (2020)"},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yan, J., Liu, S., Lei, Z., Yi, D., Li, S.Z.: A face antispoofing database with diverse attacks. In: 2012 5th IAPR international conference on Biometrics (ICB), pp. 26\u201331. IEEE (2012)","DOI":"10.1109\/ICB.2012.6199754"},{"key":"10_CR36","doi-asserted-by":"crossref","unstructured":"Zheng, T., Li, B., Wu, S., Wan, B., Mu, G., Liu, S., Ding, S., Wang, J.: Mfae: masked frequency autoencoders for domain generalization face anti-spoofing. IEEE Trans. Inf. Forens. Secur. (2024)","DOI":"10.1109\/TIFS.2024.3371266"},{"key":"10_CR37","doi-asserted-by":"crossref","unstructured":"Zhou, Q., Zhang, K.Y., Yao, T., Lu, X., Ding, S., Ma, L.: Test-time domain generalization for face anti-spoofing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 175\u2013187 (2024)","DOI":"10.1109\/CVPR52733.2024.00025"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5628-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T21:29:45Z","timestamp":1768944585000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5628-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819556274","9789819556281"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5628-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"21 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2025.prcv.cn\/index.asp","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}