{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T07:03:44Z","timestamp":1756191824137,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819984688"},{"type":"electronic","value":"9789819984695"}],"license":[{"start":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T00:00:00Z","timestamp":1703462400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T00:00:00Z","timestamp":1703462400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8469-5_13","type":"book-chapter","created":{"date-parts":[[2023,12,24]],"date-time":"2023-12-24T17:02:18Z","timestamp":1703437338000},"page":"159-171","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["KDFAS: Multi-stage Knowledge Distillation Vision Transformer for\u00a0Face Anti-spoofing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9918-7220","authenticated-orcid":false,"given":"Jun","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0265-9979","authenticated-orcid":false,"given":"Yunfei","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7415-9624","authenticated-orcid":false,"given":"Feixue","family":"Shao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1182-709X","authenticated-orcid":false,"given":"Xuetao","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4453-1439","authenticated-orcid":false,"given":"Daoxiang","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,25]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., Hadid, A.: Face anti-spoofing based on color texture analysis. In: IEEE international conference on image processing. pp. 2636\u20132640 (2015)","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., Li, L., Feng, X., Hadid, A.: Oulu-npu: A mobile face presentation attack database with real-world variations. In: IEEE international conference on automatic face & gesture recognition. pp. 612\u2013618 (2017)","DOI":"10.1109\/FG.2017.77"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Chen, D., Mei, J.P., Zhang, H., Wang, C., Feng, Y., Chen, C.: Knowledge distillation with the reused teacher classifier. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp. 11933\u201311942 (2022)","DOI":"10.1109\/CVPR52688.2022.01163"},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1109\/TIFS.2019.2922241","volume":"15","author":"H Chen","year":"2019","unstructured":"Chen, H., Hu, G., Lei, Z., Chen, Y., Robertson, N.M., Li, S.Z.: Attention-based two-stream convolutional networks for face spoofing detection. IEEE Trans. Inf. Forensics Secur. 15, 578\u2013593 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"13_CR5","unstructured":"Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: Proceedings of the international conference of biometrics special interest group. pp. 1\u20137 (2012)"},{"issue":"12","key":"13_CR6","doi-asserted-by":"publisher","first-page":"2264","DOI":"10.1109\/TIFS.2014.2349158","volume":"9","author":"I Chingovska","year":"2014","unstructured":"Chingovska, I., Dos Anjos, A.R., Marcel, S.: Biometrics evaluation under spoofing attacks. IEEE Trans. Inf. Forensics Secur. 9(12), 2264\u20132276 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"5113","DOI":"10.1007\/s10462-020-09816-7","volume":"53","author":"T Choudhary","year":"2020","unstructured":"Choudhary, T., Mishra, V., Goswami, A., Sarangapani, J.: A comprehensive survey on model compression and acceleration. Artif. Intell. Rev. 53, 5113\u20135155 (2020)","journal-title":"Artif. Intell. Rev."},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Deng, Y.: Deep learning on mobile devices: a review. In: Mobile Multimedia\/Image Processing, Security, and Applications 2019. vol. 10993, pp. 52\u201366 (2019)","DOI":"10.1117\/12.2518469"},{"key":"13_CR9","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, et al.: An image is worth 16x16 words: Transformers for image recognition at scale. In: International Conference on Learning Representations (2021)"},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1109\/ACCESS.2014.2381273","volume":"2","author":"J Galbally","year":"2014","unstructured":"Galbally, J., Marcel, S., Fierrez, J.: Biometric antispoofing methods: A survey in face recognition. IEEE Access 2, 1530\u20131552 (2014)","journal-title":"IEEE Access"},{"key":"13_CR11","unstructured":"Geras, K.J., Mohamed, A.r., Caruana, R., Urban, G., Wang, S., Aslan, O., Philipose, M., Richardson, M., Sutton, C.: Blending lstms into cnns. In: International Conference on Learning Representations (2016)"},{"key":"13_CR12","unstructured":"Hinton, G., Vinyals, O., Dean, J.: Distilling the knowledge in a neural network. In: NIPS Deep Learning and Representation Learning Workshop (2015)"},{"key":"13_CR13","unstructured":"Howard, A.G., Zhu, M., Chen, B., Kalenichenko, D., Wang, W., Weyand, T., Andreetto, M., Adam, H.: Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861 (2017)"},{"key":"13_CR14","unstructured":"Huang, Y.H., Hsieh, J.W., Chang, M.C., Ke, L., Lyu, S., Santra, A.S.: Multi-teacher single-student visual transformer with multi-level attention for face spoofing detection. In: British Machine Vision Conference. p. 125 (2021)"},{"key":"13_CR15","unstructured":"Kim, J., Park, S., Kwak, N.: Paraphrasing complex network: Network compression via factor transfer. Advances in neural information processing systems 31 (2018)"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Komulainen, J., Hadid, A., Pietik\u00e4inen, M.: Context based face anti-spoofing. In: IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems. pp. 1\u20138 (2013)","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"13_CR17","unstructured":"Laurens, Van Der Maaten, and Hinton, Geoffrey: Visualizing data using t-sne. Journal of Machine Learning Research 9(2605), 2579\u20132605 (2008)"},{"issue":"10","key":"13_CR18","doi-asserted-by":"publisher","first-page":"2639","DOI":"10.1109\/TIFS.2018.2825949","volume":"13","author":"H Li","year":"2018","unstructured":"Li, H., He, P., Wang, S., Rocha, A., Jiang, X., Kot, A.C.: Learning generalized deep feature representation for face anti-spoofing. IEEE Trans. Inf. Forensics Secur. 13(10), 2639\u20132652 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"13_CR19","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1109\/JSTSP.2020.3001719","volume":"14","author":"H Li","year":"2020","unstructured":"Li, H., Wang, S., He, P., Rocha, A.: Face anti-spoofing with deep neural network distillation. IEEE Journal of Selected Topics in Signal Processing 14(5), 933\u2013946 (2020)","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Li, S., Dong, J., Chen, J., Gao, X., Niu, S.: Vision transformer with depth auxiliary information for face anti-spoofing. In: Neural Information Processing: 29th International Conference, Part III. pp. 335\u2013346 (2023)","DOI":"10.1007\/978-3-031-30111-7_29"},{"key":"13_CR21","doi-asserted-by":"publisher","first-page":"2137","DOI":"10.1109\/TIFS.2022.3178240","volume":"17","author":"Z Li","year":"2022","unstructured":"Li, Z., Cai, R., Li, H., Lam, K.Y., Hu, Y., Kot, A.C.: One-class knowledge distillation for face presentation attack detection. IEEE Trans. Inf. Forensics Secur. 17, 2137\u20132150 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Passban, P., Wu, Y., Rezagholizadeh, M., Liu, Q.: Alp-kd: Attention-based layer projection for knowledge distillation. In: Proceedings of the AAAI Conference on artificial intelligence. vol. 35, pp. 13657\u201313665 (2021)","DOI":"10.1609\/aaai.v35i15.17610"},{"issue":"10","key":"13_CR23","doi-asserted-by":"publisher","first-page":"2268","DOI":"10.1109\/TIFS.2016.2578288","volume":"11","author":"K Patel","year":"2016","unstructured":"Patel, K., Han, H., Jain, A.K.: Secure face unlock: Spoof detection on smartphones. IEEE Trans. Inf. Forensics Secur. 11(10), 2268\u20132283 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Peng, F., Meng, S.h., Long, M.: Presentation attack detection based on two-stream vision transformers with self-attention fusion. Journal of Visual Communication and Image Representation 85, 103518 (2022)","DOI":"10.1016\/j.jvcir.2022.103518"},{"key":"13_CR25","unstructured":"Polino, A., Pascanu, R., Alistarh, D.: Model compression via distillation and quantization. arXiv preprint arXiv:1802.05668 (2018)"},{"issue":"3","key":"13_CR26","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"NK Ratha","year":"2001","unstructured":"Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614\u2013634 (2001)","journal-title":"IBM Syst. J."},{"key":"13_CR27","unstructured":"Romero, A., Ballas, N., Kahou, S.E., Chassang, A., Bengio, Y.: Fitnets: Hints for thin deep nets. In: International Conference on Learning Representations (2015)"},{"key":"13_CR28","unstructured":"Touvron, H., Cord, M., Douze, M., Massa, F., Sablayrolles, A., J\u00e9gou, H.: Training data-efficient image transformers & distillation through attention. In: International conference on machine learning. pp. 10347\u201310357 (2021)"},{"key":"13_CR29","unstructured":"Yang, J., Lei, Z., Li, S.Z.: Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601 (2014)"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Yang, X., Luo, W., Bao, L., Gao, Y., Gong, D., Zheng, S., Li, Z., Liu, W.: Face anti-spoofing: Model matters, so does data. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. pp. 3507\u20133516 (2019)","DOI":"10.1109\/CVPR.2019.00362"},{"key":"13_CR31","unstructured":"Yang, Z., Li, Z., Zeng, A., Li, Z., Yuan, C., Li, Y.: Vitkd: Practical guidelines for vit feature knowledge distillation. arXiv preprint arXiv:2209.02432 (2022)"},{"issue":"5","key":"13_CR32","first-page":"5609","volume":"45","author":"Z Yu","year":"2022","unstructured":"Yu, Z., Qin, Y., Li, X., Zhao, C., Lei, Z., Zhao, G.: Deep learning for face anti-spoofing: A survey. IEEE Trans. Pattern Anal. Mach. Intell. 45(5), 5609\u20135631 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"13_CR33","doi-asserted-by":"crossref","unstructured":"Yu, Z., Zhao, C., Wang, Z., Qin, Y., Su, Z., Li, X., Zhou, F., Zhao, G.: Searching central difference convolutional networks for face anti-spoofing. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. pp. 5295\u20135305 (2020)","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"13_CR34","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.jvcir.2018.01.001","volume":"51","author":"LB Zhang","year":"2018","unstructured":"Zhang, L.B., Peng, F., Qin, L., Long, M.: Face spoofing detection based on color texture markov feature and support vector machine recursive feature elimination. J. Vis. Commun. Image Represent. 51, 56\u201369 (2018)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"13_CR35","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yan, J., Liu, S., Lei, Z., Yi, D., Li, S.Z.: A face anti-spoofing database with diverse attacks. In: IAPR international conference on Biometrics. pp. 26\u201331 (2012)","DOI":"10.1109\/ICB.2012.6199754"},{"key":"13_CR36","unstructured":"Zhu, M., Tang, Y., Han, K.: Vision transformer pruning. arXiv preprint arXiv:2104.08500 (2021)"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8469-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,24]],"date-time":"2023-12-24T17:04:13Z","timestamp":1703437453000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8469-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,25]]},"ISBN":["9789819984688","9789819984695"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8469-5_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023,12,25]]},"assertion":[{"value":"25 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/prcv2023.xmu.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1420","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"532","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,78","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,69","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}