{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:08:39Z","timestamp":1743124119185,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819756117"},{"type":"electronic","value":"9789819756124"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5612-4_2","type":"book-chapter","created":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T13:03:51Z","timestamp":1722344631000},"page":"15-26","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive Swin Transformers for Few-Shot Cross-Domain Silent Face Liveness Detection"],"prefix":"10.1007","author":[{"given":"Ying","family":"Tang","sequence":"first","affiliation":[]},{"given":"Zhongyue","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Minchao","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Zhaojuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yaping","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Huijuan","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Wanli","family":"Huo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,31]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"M\u00e4\u00e4tt\u00e4, J., Hadid, A., Pietik\u00e4inen, M.: Face spoofing detection from single images using micro-texture analysis. In: 2011 International Joint Conference on Biometrics (IJCB), pp. 1\u20137. IEEE (2011)","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Liu, Y., Jourabloo, A., Liu, X.: Learning deep models for face anti-spoofing: binary or auxiliary supervision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 389\u2013398. IEEE (2018)","DOI":"10.1109\/CVPR.2018.00048"},{"issue":"7","key":"2_CR3","doi-asserted-by":"publisher","first-page":"1794","DOI":"10.1109\/TIFS.2018.2801312","volume":"13","author":"H Li","year":"2018","unstructured":"Li, H., Li, W., Cao, H., Wang, S., Huang, F., Kot, A.C.: Unsupervised domain adaptation for face anti-spoofing. IEEE Trans. Inf. Forensics Secur. 13(7), 1794\u20131809 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Wang, Z., et al.: Domain generalization via shuffled style assembly for face anti-spoofing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4123\u20134133. IEEE (2022)","DOI":"10.1109\/CVPR52688.2022.00409"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Jia, Y., Zhang, J., Shan, S., Chen, X.: Single-side domain generalization for face anti-spoofing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 8484\u20138493. IEEE (2020)","DOI":"10.1109\/CVPR42600.2020.00851"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Komulainen, J., Hadid, A., Pietik\u00e4inen, M.: Context based face anti-spoofing. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1\u20138. IEEE (2013)","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Yu, Z., et al.: Searching central difference convolutional networks for face anti-spoofing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5295\u20135305. IEEE (2020)","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Wang, Y.C., Wang, C.Y., Lai, S.H.: Disentangled representation with dual-stage feature learning for face anti-spoofing. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 1955\u20131964. IEEE (2022)","DOI":"10.1109\/WACV51458.2022.00130"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Liu, S., Lu, S., Xu, H., Yang, J., Ding, S., Ma, L.: Feature generation and hypothesis verification for reliable face anti-spoofing. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 1782-1791. IEEE (2022)","DOI":"10.1609\/aaai.v36i2.20071"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Zhou, Q., et al.: Instance-aware domain generalization for face anti-spoofing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 20453\u201320463. IEEE (2023)","DOI":"10.1109\/CVPR52729.2023.01959"},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"86966","DOI":"10.1109\/ACCESS.2021.3077629","volume":"9","author":"T Kim","year":"2021","unstructured":"Kim, T., Kim, Y.: Suppressing spoof-irrelevant factors for domain-agnostic face anti-spoofing. IEEE Access 9, 86966\u201386974 (2021)","journal-title":"IEEE Access"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Chen, Z., Yao, T., Sheng, K., Ding, S., Tai, Y., Li, J, et al.: Generalizable representation learning for mixture domain face anti-spoofing. In: Proceedings of the AAAI conference on artificial intelligence, pp. 1132-1139. IEEE (2021)","DOI":"10.1609\/aaai.v35i2.16199"},{"key":"2_CR13","unstructured":"Yang, B., Zhang, J., Yin, Z., Shao, J.: Few-shot domain expansion for face anti-spoofing (2021). arxiv preprint arxiv:2106.14162"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Wang, G., Han, H., Shan, S., Chen, X.: Cross-domain face presentation attack detection via multi-domain disentangled representation learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 6678\u20136687. IEEE (2020)","DOI":"10.1109\/CVPR42600.2020.00671"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Liu, S., et al.: Dual reweighting domain generalization for face presentation attack detection (2021). arxiv preprint arxiv:2106.16128","DOI":"10.24963\/ijcai.2021\/120"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Liu, Z., et al.: Swin transformer: hierarchical vision transformer using shifted windows. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 10012\u201310022. IEEE (2021)","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Yang, X., et al.: Face anti-spoofing: model matters, so does data. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3507\u20133516. IEEE (2019)","DOI":"10.1109\/CVPR.2019.00362"},{"key":"2_CR18","unstructured":"Houlsby, N., et al.: Parameter-efficient transfer learning for NLP. In: International Conference on Machine Learning, pp. 2790\u20132799. PMLR (2019)"},{"key":"2_CR19","unstructured":"Tseng, H.Y., Lee, H.Y., Huang, J.B., Yang, M.H.: Cross-domain few-shot classification via learned feature-wise transformation (2020). arxiv preprint arxiv:2001.08735"},{"issue":"4","key":"2_CR20","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"D Wen","year":"2015","unstructured":"Wen, D., Han, H., Jain, A.K.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forensics Secur. 10(4), 746\u2013761 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yan, J., Liu, S., Lei, Z., Yi, D., Li, S. Z.: A face antispoofing database with diverse attacks. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 26\u201331. IEEE (2012)","DOI":"10.1109\/ICB.2012.6199754"},{"key":"2_CR22","unstructured":"Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: 2012 BIOSIG-Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG), pp. 1\u20137. IEEE (2012)"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., Li, L., Feng, X., Hadid, A.: OULU-NPU: a mobile face presentation attack database with real-world variations. In: 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017), pp. 612\u2013618. IEEE (2017)","DOI":"10.1109\/FG.2017.77"},{"issue":"9","key":"2_CR24","doi-asserted-by":"publisher","first-page":"3005","DOI":"10.1109\/TPAMI.2020.3036338","volume":"43","author":"Z Yu","year":"2020","unstructured":"Yu, Z., Wan, J., Qin, Y., Li, X., Li, S.Z., Zhao, G.: Nas-fas: static-dynamic central difference network search for face anti-spoofing. IEEE Trans. Pattern Anal. Mach. Intell. 43(9), 3005\u20133023 (2020)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Wang, J., Zhang, J., Bian, Y., Cai, Y., Wang, C., Pu, S.: Self-domain adaptation for face anti-spoofing. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 2746\u20132754. IEEE (2021)","DOI":"10.1609\/aaai.v35i4.16379"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5612-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T13:04:56Z","timestamp":1722344696000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5612-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819756117","9789819756124"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5612-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"31 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Disclosure of Interests. The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/2024\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}