{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T08:03:11Z","timestamp":1764403391809,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819755936"},{"type":"electronic","value":"9789819755943"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5594-3_39","type":"book-chapter","created":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T15:06:26Z","timestamp":1723561586000},"page":"468-477","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Dual-Branch Network with Supcon for Face Anti-spoofing"],"prefix":"10.1007","author":[{"given":"Kanghua","family":"Hui","sequence":"first","affiliation":[]},{"given":"Youzhi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Haohan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Sihua","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,14]]},"reference":[{"key":"39_CR1","first-page":"18661","volume":"33","author":"P Khosla","year":"2020","unstructured":"Khosla, P., Teterwak, P., Wang, C., et al.: Supervised contrastive learning. Adv. Neural. Inf. Process. Syst. 33, 18661\u201318673 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., Li, L., et al.: OULU-NPU: a mobile face presentation attack database with real-world variations. In: 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition, pp. 612\u2013618. IEEE (2017)","DOI":"10.1109\/FG.2017.77"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Liu, S., Zhang, K.Y., Yao, T., et al.: Adaptive normalized representation learning for generalizable face anti-spoofing. In: Proceedings of the 29th ACM International Conference on Multimedia, pp. 1469\u20131477 (2021)","DOI":"10.1145\/3474085.3475279"},{"key":"39_CR4","unstructured":"Feng, H., Hong, Z., Yue, H., et al.: Learning generalized spoof cues for face anti-spoofing.\u00a0arXiv preprint arXiv:2005.03922 (2020)"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Wang, C.Y., Lu, Y.D., et al.: PatchNet: a simple face anti-spoofing framework via fine-grained patch recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 20281\u201320290 (2022)","DOI":"10.1109\/CVPR52688.2022.01964"},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"Sun, Y., Liu, Y., Liu, X., Li, Y., Chu, W.S.: Rethinking domain generalization for face anti-spoofing: separability and alignment. In: Proceedings of the IEEE\/CVF Conference on computer vision and pattern recognition, pp. 24563\u201324574 (2023)","DOI":"10.1109\/CVPR52729.2023.02353"},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"Deb, D., Liu, X., Jain, A.K.: Unified detection of digital and physical face at tacks. In: 2023 IEEE 17th International Conference on Automatic Face and Gesture Recognition (FG), pp. 1\u20138. IEEE (2023)","DOI":"10.1109\/FG57933.2023.10042500"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Liu, Z., Mao, H., Wu, C.Y., et al.: A convnet for the 2020s. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 11976\u201311986 (2022)","DOI":"10.1109\/CVPR52688.2022.01167"},{"issue":"4","key":"39_CR9","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1109\/TPAMI.2017.2699184","volume":"40","author":"LC Chen","year":"2017","unstructured":"Chen, L.C., Papandreou, G., Kokkinos, I., et al.: Semantic image segmentation with deep convolutional nets. IEEE Trans. Pattern Anal. Mach. Intell. 40(4), 834\u2013848 (2017)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"39_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-01234-2_1","volume-title":"Computer Vision \u2013 ECCV 2018","author":"S Woo","year":"2018","unstructured":"Woo, S., Park, J., Lee, J.-Y., Kweon, I.S.: CBAM: convolutional block attention module. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11211, pp. 3\u201319. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01234-2_1"},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., et al.: ArcFace: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4690\u20134699 (2019)","DOI":"10.1109\/CVPR.2019.00482"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Liu, Y., Jourabloo, A., Liu, X.: Learning deep models for face anti-spoofing: binary or auxiliary supervision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 389\u2013398 (2018)","DOI":"10.1109\/CVPR.2018.00048"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yan, J., Liu, S., et al.: A face antispoofing database with diverse attacks. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 26\u201331. IEEE (2012)","DOI":"10.1109\/ICB.2012.6199754"},{"key":"39_CR14","unstructured":"Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: 2012 BIOSIG-Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG), pp. 1\u20137. IEEE (2012)"},{"issue":"4","key":"39_CR15","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"D Wen","year":"2015","unstructured":"Wen, D., Han, H., Jain, A.K.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forensics Secur. 10(4), 746\u2013761 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"39_CR16","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Ververas, E., et al. Retinaface: single-shot multi-level face localisation in the wild. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5203\u20135212 (2020)","DOI":"10.1109\/CVPR42600.2020.00525"},{"key":"39_CR17","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1109\/TIFS.2019.2922241","volume":"15","author":"H Chen","year":"2019","unstructured":"Chen, H., Hu, G., Lei, Z., et al.: Attention-based two-stream convolutional networks for face spoofing detection. IEEE Trans. Inf. Forensics Secur. 15, 578\u2013593 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"39_CR18","doi-asserted-by":"crossref","unstructured":"Yu, Z., Zhao, C., Wang, Z., et al.: Searching central difference convolutional networks for face anti-spoofing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5295\u20135305 (2020)","DOI":"10.1109\/CVPR42600.2020.00534"},{"issue":"9","key":"39_CR19","doi-asserted-by":"publisher","first-page":"3005","DOI":"10.1109\/TPAMI.2020.3036338","volume":"43","author":"Z Yu","year":"2020","unstructured":"Yu, Z., Wan, J., Qin, Y., et al.: NAS-FAS: static-dynamic central difference network search for face anti-spoofing. IEEE Trans. Pattern Anal. Mach. Intell. 43(9), 3005\u20133023 (2020)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"39_CR20","doi-asserted-by":"crossref","unstructured":"Jia, Y., Zhang, J., Shan, S., Chen, X.: Single-side domain generalization for face anti-spoofing. In: Proceedings of the IEEE\/CVF Conference on computer vision and pattern recognition, pp. 8484\u20138493 (2020)","DOI":"10.1109\/CVPR42600.2020.00851"},{"key":"39_CR21","doi-asserted-by":"crossref","unstructured":"Liu, S., Zhang, K.Y., Yao, T., et al.: Dual reweighting domain generalization for face presentation attack detection. arXiv preprint arXiv:2106.16128 (2021)","DOI":"10.24963\/ijcai.2021\/120"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5594-3_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T15:13:47Z","timestamp":1723562027000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5594-3_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819755936","9789819755943"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5594-3_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"14 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/2024\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}