{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T09:20:09Z","timestamp":1768468809521,"version":"3.49.0"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T00:00:00Z","timestamp":1717632000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T00:00:00Z","timestamp":1717632000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62236010"],"award-info":[{"award-number":["62236010"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62306022"],"award-info":[{"award-number":["62306022"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Vis"],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s11263-024-02092-w","type":"journal-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T05:11:58Z","timestamp":1717650718000},"page":"5239-5254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Quality-Invariant Domain Generalization for Face Anti-Spoofing"],"prefix":"10.1007","volume":"132","author":[{"given":"Yongluo","family":"Liu","sequence":"first","affiliation":[]},{"given":"Zun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yaowen","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Zhizhi","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Zhaofan","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Lifang","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,6]]},"reference":[{"issue":"1","key":"2092_CR1","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/s12652-021-03316-4","volume":"14","author":"S Bojjagani","year":"2023","unstructured":"Bojjagani, S., Sastry, V., Chen, C.-M., Kumari, S., & Khan, M. K. (2023). Systematic survey of mobile payments, protocols, and security infrastructure. Journal of Ambient Intelligence and Humanized Computing, 14(1), 609\u2013654.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"2092_CR2","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., & Hadid, A. (2015). Face anti-spoofing based on color texture analysis. In: IEEE International Conference on Image Processing, 2636\u20132640.","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"2092_CR3","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., Li, L., Feng, X., & Hadid, A. (2017). Oulu-npu: A mobile face presentation attack database with real-world variations. In: 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition, 612\u2013618.","DOI":"10.1109\/FG.2017.77"},{"issue":"8","key":"2092_CR4","doi-asserted-by":"publisher","first-page":"1818","DOI":"10.1109\/TIFS.2016.2555286","volume":"11","author":"Z Boulkenafet","year":"2016","unstructured":"Boulkenafet, Z., Komulainen, J., & Hadid, A. (2016). Face spoofing detection using colour texture analysis. IEEE Transactions on Information Forensics and Security, 11(8), 1818\u20131830.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2092_CR5","doi-asserted-by":"crossref","unstructured":"Chen, Z., Yao, T., Sheng, K., Ding, S., Tai, Y., Li, J., Huang, F., & Jin, X. (2021). Generalizable representation learning for mixture domain face anti-spoofing. In: Proceedings of the AAAI Conference on Artificial Intelligence, 35, 1132\u20131139.","DOI":"10.1609\/aaai.v35i2.16199"},{"key":"2092_CR6","doi-asserted-by":"publisher","first-page":"28140","DOI":"10.1109\/ACCESS.2021.3052728","volume":"9","author":"X Chen","year":"2021","unstructured":"Chen, X., Xu, S., Ji, Q., & Cao, S. (2021). A dataset and benchmark towards multi-modal face anti-spoofing under surveillance scenarios. IEEE Access, 9, 28140\u201328155.","journal-title":"IEEE Access"},{"key":"2092_CR7","unstructured":"Chingovska, I., Anjos, A., & Marcel, S. (2012). On the effectiveness of local binary patterns in face anti-spoofing. In: 2012 BIOSIG-proceedings of the International Conference of Biometrics Special Interest Group, 1\u20137."},{"key":"2092_CR8","unstructured":"Chingovska, I., Anjos, A., & Marcel, S. On the effectiveness of local binary patterns in face anti-spoofing. In: 2012 BIOSIG-proceedings of the International Conference of Biometrics Special Interest Group, pp. 1\u20137 (2012)."},{"key":"2092_CR9","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer, M., Heigold, G., Gelly, S., Uszkoreit J. (2020). An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929"},{"key":"2092_CR10","unstructured":"Escalera, S., Escalante, H.J., Lei, Z., Fang, H., Liu, A., & Wan, J. (2023). Surveillance face presentation attack detection challenge. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 6360\u20136370."},{"key":"2092_CR11","doi-asserted-by":"crossref","unstructured":"Fang, H., Liu, A., Wan, J., Escalera, S., Escalante, H.J., & Lei, Z. (2023). Surveillance face presentation attack detection challenge. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 6360\u20136370.","DOI":"10.1109\/CVPRW59228.2023.00677"},{"key":"2092_CR12","doi-asserted-by":"publisher","first-page":"1535","DOI":"10.1109\/TIFS.2023.3337970","volume":"19","author":"H Fang","year":"2024","unstructured":"Fang, H., Liu, A., Wan, J., Escalera, S., Zhao, C., Zhang, X., Li, S. Z., & Lei, Z. (2024). Surveillance face anti-spoofing. IEEE Transactions on Information Forensics and Security, 19, 1535\u20131546.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2092_CR13","doi-asserted-by":"crossref","unstructured":"Galbally, J., & Marcel, S. (2014). Face anti-spoofing based on general image quality assessment. In: International Conference on Pattern Recognition, 1173\u20131178.","DOI":"10.1109\/ICPR.2014.211"},{"issue":"2","key":"2092_CR14","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/TIP.2013.2292332","volume":"23","author":"J Galbally","year":"2013","unstructured":"Galbally, J., Marcel, S., & Fierrez, J. (2013). Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition. IEEE Transactions on Image Processing, 23(2), 710\u2013724.","journal-title":"IEEE Transactions on Image Processing"},{"key":"2092_CR15","unstructured":"Ganin, Y., & Lempitsky, V. (2015). Unsupervised domain adaptation by backpropagation. In: International Conference on Machine Learning, 1180\u20131189."},{"key":"2092_CR16","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 770\u2013778.","DOI":"10.1109\/CVPR.2016.90"},{"issue":"4","key":"2092_CR17","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1109\/TBIOM.2023.3312128","volume":"5","author":"Y He","year":"2023","unstructured":"He, Y., Peng, F., & Long, M. (2023). Dynamic residual distillation network for face anti-spoofing with feature attention learning. IEEE Transactions on Biometrics, Behavior, and Identity Science, 5(4), 579\u2013592.","journal-title":"IEEE Transactions on Biometrics, Behavior, and Identity Science"},{"key":"2092_CR18","unstructured":"Hermans, A., Beyer, L., & Leibe, B. (2017). In defense of the triplet loss for person re-identification. arXiv preprint arXiv:1703.07737"},{"key":"2092_CR19","doi-asserted-by":"crossref","unstructured":"Huang, H., Xiang, Y., Yang, G., Lv, L., Li, X., Weng, Z., & Fu, Y. (2022). Generalized face anti-spoofing via cross-adversarial disentanglement with mixing augmentation. In: IEEE International Conference on Acoustics, Speech and Signal Processing, 2939\u20132943.","DOI":"10.1109\/ICASSP43922.2022.9746716"},{"key":"2092_CR20","unstructured":"International Organization for Standardization (2010). ISO\/IEC TR 29794-4:2010 information technology\u2013Biometric sample quality\u2013Part 5: Face image data."},{"key":"2092_CR21","doi-asserted-by":"crossref","unstructured":"Jia, Y., Zhang, J., Shan, S., & Chen, X. (2020). Single-side domain generalization for face anti-spoofing. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 8484\u20138493.","DOI":"10.1109\/CVPR42600.2020.00851"},{"key":"2092_CR22","doi-asserted-by":"crossref","unstructured":"Jiang, F., Li, Q., Liu, P., Zhou, X.-D., & Sun, Z. (2023). Adversarial learning domain-invariant conditional features for robust face anti-spoofing. International Journal of Computer Vision, 1\u201324.","DOI":"10.1007\/s11263-023-01778-x"},{"key":"2092_CR23","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1109\/TIFS.2021.3134869","volume":"17","author":"Y Jia","year":"2021","unstructured":"Jia, Y., Zhang, J., & Shan, S. (2021). Dual-branch meta-learning network with distribution alignment for face anti-spoofing. IEEE Transactions on Information Forensics and Security, 17, 138\u2013151.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2092_CR24","doi-asserted-by":"crossref","unstructured":"Kim, T., Kim, Y., Kim, I., & Kim, D. (2019). Basn: Enriching feature representation using bipartite auxiliary supervisions for face anti-spoofing. In: Proceedings of the IEEE International Conference on Computer Vision Workshops, 0\u20130.","DOI":"10.1109\/ICCVW.2019.00062"},{"key":"2092_CR25","unstructured":"Kinga, D., & Adam, J.B. (2015). A method for stochastic optimization. In: International Conference on Learning Representations, 5, 6."},{"key":"2092_CR26","doi-asserted-by":"crossref","unstructured":"Li, H., Pan, S.J., Wang, S., & Kot, A.C. (2018). Domain generalization with adversarial feature learning. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 5400\u20135409.","DOI":"10.1109\/CVPR.2018.00566"},{"issue":"7","key":"2092_CR27","doi-asserted-by":"publisher","first-page":"1794","DOI":"10.1109\/TIFS.2018.2801312","volume":"13","author":"H Li","year":"2018","unstructured":"Li, H., Li, W., Cao, H., Wang, S., Huang, F., & Kot, A. C. (2018). Unsupervised domain adaptation for face anti-spoofing. IEEE Transactions on Information Forensics and Security, 13(7), 1794\u20131809.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2092_CR28","doi-asserted-by":"crossref","unstructured":"Liu, A., Tan, Z., Wan, J., Escalera, S., Guo, G., & Li, S.Z. (2021). Casia-surf cefa: A benchmark for multi-modal cross-ethnicity face anti-spoofing. In: Proceedings of the IEEE Winter Conference on Applications of Computer Vision, 1179\u20131187.","DOI":"10.1109\/WACV48630.2021.00122"},{"key":"2092_CR29","doi-asserted-by":"crossref","unstructured":"Liu, A., Wan, J., Escalera, S., Jair\u00a0Escalante, H., Tan, Z., Yuan, Q., Wang, K., Lin, C., Guo, G., & Guyon, I., Li, S.Z. (2019). Multi-modal face anti-spoofing attack detection challenge at cvpr2019. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 1\u201310.","DOI":"10.1109\/CVPRW.2019.00202"},{"key":"2092_CR30","doi-asserted-by":"crossref","unstructured":"Liu, A., Wan, J., Jiang, N., Wang, H., & Liang, Y. (2022). Disentangling facial pose and appearance information for face anti-spoofing. In: 2022 26th International Conference on Pattern Recognition, 4537\u20134543.","DOI":"10.1109\/ICPR56361.2022.9956674"},{"key":"2092_CR31","doi-asserted-by":"crossref","unstructured":"Liu, Y., Xu, Y., Zou, Z., Wang, Z., Zhang, b., Wu, L., Guo, Z., & He, Z. (2023). Adversarial domain generalization for surveillance face anti-spoofing. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 6351\u20136359.","DOI":"10.1109\/CVPRW59228.2023.00676"},{"key":"2092_CR32","doi-asserted-by":"crossref","unstructured":"Liu, S., Zhang, K.-Y., Yao, T., Bi, M., Ding, S., Li, J., Huang, F., & Ma, L. (2021). Adaptive normalized representation learning for generalizable face anti-spoofing. In: Proceedings of the 29th ACM International Conference on Multimedia, 1469\u20131477.","DOI":"10.1145\/3474085.3475279"},{"key":"2092_CR33","doi-asserted-by":"crossref","unstructured":"Liu, S., Zhang, K.-Y., Yao, T., Sheng, K., Ding, S., Tai, Y., Li, J., Xie, Y., & Ma, L. (2021). Dual reweighting domain generalization for face presentation attack detection. arXiv preprint arXiv:2106.16128","DOI":"10.24963\/ijcai.2021\/120"},{"key":"2092_CR34","doi-asserted-by":"crossref","unstructured":"Liu, A., Zhao, C., Yu, Z., Su, A., Liu, X., Kong, Z., Wan, J., Escalera, S., Escalante, H.J., & Lei, Z., Guo, G. (2021). 3d high-fidelity mask face presentation attack detection challenge. In: Proceedings of the IEEE International Conference on Computer Vision, 814\u2013823.","DOI":"10.1109\/ICCVW54120.2021.00096"},{"issue":"1","key":"2092_CR35","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1049\/bme2.12002","volume":"10","author":"A Liu","year":"2021","unstructured":"Liu, A., Li, X., Wan, J., Liang, Y., Escalera, S., Escalante, H. J., Madadi, M., Jin, Y., Wu, Z., Yu, X., et al. (2021). Cross-ethnicity face anti-spoofing recognition challenge: A review. IET Biometrics, 10(1), 24\u201343.","journal-title":"IET Biometrics"},{"key":"2092_CR36","doi-asserted-by":"publisher","first-page":"2759","DOI":"10.1109\/TIFS.2021.3065495","volume":"16","author":"A Liu","year":"2021","unstructured":"Liu, A., Tan, Z., Wan, J., Liang, Y., Lei, Z., Guo, G., & Li, S. Z. (2021). Face anti-spoofing via adversarial cross-modality translation. IEEE Transactions on Information Forensics and Security, 16, 2759\u20132772.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2092_CR37","doi-asserted-by":"publisher","first-page":"2497","DOI":"10.1109\/TIFS.2022.3188149","volume":"17","author":"A Liu","year":"2022","unstructured":"Liu, A., Zhao, C., Yu, Z., Wan, J., Su, A., Liu, X., Tan, Z., Escalera, S., Xing, J., Liang, Y., et al. (2022). Contrastive context-aware learning for 3d high-fidelity mask face presentation attack detection. IEEE Transactions on Information Forensics and Security, 17, 2497\u20132507.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"11","key":"2092_CR38","first-page":"2579","volume":"9","author":"L Maaten","year":"2008","unstructured":"Maaten, L., & Hinton, G. (2008). Visualizing data using t-sne. Journal of Machine Learning Research, 9(11), 2579\u20132605.","journal-title":"Journal of Machine Learning Research"},{"key":"2092_CR39","doi-asserted-by":"crossref","unstructured":"M\u00e4\u00e4tt\u00e4, J., Hadid, A., & Pietik\u00e4inen, M. (2011). Face spoofing detection from single images using micro-texture analysis. In: International Joint Conference on Biometrics, 1\u20137.","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"2092_CR40","doi-asserted-by":"crossref","unstructured":"Ou, F.-Z., Chen, X., Zhang, R., Huang, Y., Li, S., Li, J., Li, Y., Cao, L., & Wang, Y.-G. (2021). Sdd-fiqa: unsupervised face image quality assessment with similarity distribution distance. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 7670\u20137679.","DOI":"10.1109\/CVPR46437.2021.00758"},{"issue":"10","key":"2092_CR41","doi-asserted-by":"publisher","first-page":"2268","DOI":"10.1109\/TIFS.2016.2578288","volume":"11","author":"K Patel","year":"2016","unstructured":"Patel, K., Han, H., & Jain, A. K. (2016). Secure face unlock: Spoof detection on smartphones. IEEE Transactions on Information Forensics and Security, 11(10), 2268\u20132283.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2092_CR42","doi-asserted-by":"crossref","unstructured":"Saha, S., Xu, W., Kanakis, M., Georgoulis, S., Chen, Y., Paudel, D.P., & Van\u00a0Gool, L. (2020). Domain agnostic feature learning for image and video based face anti-spoofing. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 802\u2013803.","DOI":"10.1109\/CVPRW50498.2020.00409"},{"key":"2092_CR43","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/s11263-016-0933-2","volume":"122","author":"MS Sarfraz","year":"2017","unstructured":"Sarfraz, M. S., & Stiefelhagen, R. (2017). Deep perceptual mapping for cross-modal face recognition. International Journal of Computer Vision, 122, 426\u2013438.","journal-title":"International Journal of Computer Vision"},{"issue":"10s","key":"2092_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3507901","volume":"54","author":"T Schlett","year":"2022","unstructured":"Schlett, T., Rathgeb, C., Henniger, O., Galbally, J., Fierrez, J., & Busch, C. (2022). Face image quality assessment: A literature survey. ACM Computing Surveys, 54(10s), 1\u201349.","journal-title":"ACM Computing Surveys"},{"key":"2092_CR45","doi-asserted-by":"crossref","unstructured":"Shao, R., Lan, X., & Yuen, P.C. (2020). Regularized fine-grained meta face anti-spoofing. In: Proceedings of the AAAI Conference on Artificial Intelligence, 34, 11974\u201311981.","DOI":"10.1609\/aaai.v34i07.6873"},{"key":"2092_CR46","doi-asserted-by":"crossref","unstructured":"Shao, R., Lan, X., Li, J., & Yuen, P.C. (2019). Multi-adversarial discriminative deep domain generalization for face presentation attack detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 10023\u201310031.","DOI":"10.1109\/CVPR.2019.01026"},{"key":"2092_CR47","doi-asserted-by":"crossref","unstructured":"Stehouwer, J., Jourabloo, A., Liu, Y., & Liu, X. (2020). Noise modeling, synthesis and classification for generic object anti-spoofing. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 7294\u20137303.","DOI":"10.1109\/CVPR42600.2020.00732"},{"key":"2092_CR48","doi-asserted-by":"crossref","unstructured":"Sun, Y., Liu, Y., Liu, X., Li, Y., & Chu, W.-S. (2023). Rethinking domain generalization for face anti-spoofing: Separability and alignment. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 24563\u201324574.","DOI":"10.1109\/CVPR52729.2023.02353"},{"key":"2092_CR49","doi-asserted-by":"crossref","unstructured":"Torralba, A., & Efros, A.A. (2011). Unbiased look at dataset bias. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 1521\u20131528.","DOI":"10.1109\/CVPR.2011.5995347"},{"key":"2092_CR50","doi-asserted-by":"crossref","unstructured":"Wang, G., Han, H., Shan, S., & Chen, X. (2020). Cross-domain face presentation attack detection via multi-domain disentangled representation learning. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 6678\u20136687.","DOI":"10.1109\/CVPR42600.2020.00671"},{"key":"2092_CR51","doi-asserted-by":"crossref","unstructured":"Wang, K., Huang, M., Zhang, G., Yue, H., Zhang, G., & Qiao, Y. (2023). Dynamic feature queue for surveillance face anti-spoofing via progressive training. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 6371\u20136378.","DOI":"10.1109\/CVPRW59228.2023.00678"},{"key":"2092_CR52","doi-asserted-by":"crossref","unstructured":"Wang, C.-Y., Lu, Y.-D., Yang, S.-T., & Lai, S.-H. (2022). Patchnet: A simple face anti-spoofing framework via fine-grained patch recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 20281\u201320290.","DOI":"10.1109\/CVPR52688.2022.01964"},{"key":"2092_CR53","doi-asserted-by":"crossref","unstructured":"Wang, Z., Wang, Z., Yu, Z., Deng, W., Li, J., Gao, T., & Wang, Z. (2022). Domain generalization via shuffled style assembly for face anti-spoofing. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 4123\u20134133.","DOI":"10.1109\/CVPR52688.2022.00409"},{"key":"2092_CR54","doi-asserted-by":"crossref","unstructured":"Wang, J., Zhang, J., Bian, Y., Cai, Y., Wang, C., & Pu, S. (2021). Self-domain adaptation for face anti-spoofing. In: Proceedings of the AAAI Conference on Artificial Intelligence, 35, 2746\u20132754.","DOI":"10.1609\/aaai.v35i4.16379"},{"issue":"3","key":"2092_CR55","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1109\/TBIOM.2022.3184500","volume":"4","author":"Z Wang","year":"2022","unstructured":"Wang, Z., Wang, Q., Deng, W., & Guo, G. (2022). Face anti-spoofing using transformers with relation-aware mechanism. IEEE Transactions on Biometrics, Behavior, and Identity Science, 4(3), 439\u2013450.","journal-title":"IEEE Transactions on Biometrics, Behavior, and Identity Science"},{"key":"2092_CR56","doi-asserted-by":"crossref","unstructured":"Wang, Z., Yu, Z., Wang, X., Qin, Y., Li, J., Zhao, C., Liu, X., & Lei, Z. (2023). Consistency regularization for deep face anti-spoofing. IEEE Transactions on Information Forensics and Security, 18, 1127\u20131140.","DOI":"10.1109\/TIFS.2023.3235581"},{"issue":"4","key":"2092_CR57","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"D Wen","year":"2015","unstructured":"Wen, D., Han, H., & Jain, A. K. (2015). Face spoof detection with image distortion analysis. IEEE Transactions on Information Forensics and Security, 10(4), 746\u2013761.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"12","key":"2092_CR58","first-page":"2469","volume":"38","author":"Y Xu","year":"2022","unstructured":"Xu, Y., Wu, L., Liu, Y., Wang, Z., & Li, Z. (2022). A face anti-spoofing algorithm based on anomaly detection in disentangling space. Journal of Signal Processing, 38(12), 2469\u20132485.","journal-title":"Journal of Signal Processing"},{"key":"2092_CR59","unstructured":"Yang, J., Lei, Z., & Li, S.Z. (2014). Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601"},{"key":"2092_CR60","doi-asserted-by":"crossref","unstructured":"Yu, Z., Zhao, C., Wang, Z., Qin, Y., Su, Z., Li, X., Zhou, F., & Zhao, G. (2020). Searching central difference convolutional networks for face anti-spoofing. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 5295\u20135305.","DOI":"10.1109\/CVPR42600.2020.00534"},{"issue":"3","key":"2092_CR61","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/TBIOM.2021.3065526","volume":"3","author":"Z Yu","year":"2021","unstructured":"Yu, Z., Li, X., Shi, J., Xia, Z., & Zhao, G. (2021). Revisiting pixel-wise supervision for face anti-spoofing. IEEE Transactions on Biometrics, Behavior, and Identity Science, 3(3), 285\u2013295.","journal-title":"IEEE Transactions on Biometrics, Behavior, and Identity Science"},{"issue":"9","key":"2092_CR62","doi-asserted-by":"publisher","first-page":"3005","DOI":"10.1109\/TPAMI.2020.3036338","volume":"43","author":"Z Yu","year":"2020","unstructured":"Yu, Z., Wan, J., Qin, Y., Li, X., Li, S. Z., & Zhao, G. (2020). Nas-fas: Static-dynamic central difference network search for face anti-spoofing. IEEE Transactions on Pattern Analysis and Machine Intelligence, 43(9), 3005\u20133023.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"3","key":"2092_CR63","doi-asserted-by":"publisher","first-page":"5152","DOI":"10.1109\/JIOT.2019.2897334","volume":"6","author":"Z Yu","year":"2019","unstructured":"Yu, Z., Xu, E., Du, H., Guo, B., & Yao, L. (2019). Inferring user profile attributes from multidimensional mobile phone sensory data. IEEE Internet of Things Journal, 6(3), 5152\u20135162.","journal-title":"IEEE Internet of Things Journal"},{"key":"2092_CR64","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yan, J., Liu, S., Lei, Z., Yi, D., & Li, S.Z. (2012). A face antispoofing database with diverse attacks. In: 2012 5th IAPR International Conference on Biometrics, 26\u201331.","DOI":"10.1109\/ICB.2012.6199754"},{"key":"2092_CR65","doi-asserted-by":"crossref","unstructured":"Zhang, K.-Y., Yao, T., Zhang, J., Tai, Y., Ding, S., Li, J., Huang, F., Song, H., & Ma, L. (2020). Face anti-spoofing via disentangled representation learning. In: Proceedings of the European Conference on Computer Vision, 641\u2013657.","DOI":"10.1007\/978-3-030-58529-7_38"},{"issue":"2","key":"2092_CR66","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/TBIOM.2020.2973001","volume":"2","author":"S Zhang","year":"2020","unstructured":"Zhang, S., Liu, A., Wan, J., Liang, Y., Guo, G., Escalera, S., Escalante, H. J., & Li, S. Z. (2020). Casia-surf: A large-scale multi-modal benchmark for face anti-spoofing. IEEE Transactions on Biometrics, Behavior, and Identity Science, 2(2), 182\u2013193.","journal-title":"IEEE Transactions on Biometrics, Behavior, and Identity Science"},{"issue":"10","key":"2092_CR67","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang, K., Zhang, Z., Li, Z., & Qiao, Y. (2016). Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Processing Letters, 23(10), 1499\u20131503.","journal-title":"IEEE Signal Processing Letters"},{"key":"2092_CR68","doi-asserted-by":"crossref","unstructured":"Zhou, Q., Zhang, K.-Y., Yao, T., Lu, X., Yi, R., Ding, S., & Ma, L. (2023). Instance-aware domain generalization for face anti-spoofing. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 20453\u201320463.","DOI":"10.1109\/CVPR52729.2023.01959"}],"container-title":["International Journal of Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-024-02092-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11263-024-02092-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-024-02092-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T05:17:25Z","timestamp":1729919845000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11263-024-02092-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,6]]},"references-count":68,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["2092"],"URL":"https:\/\/doi.org\/10.1007\/s11263-024-02092-w","relation":{},"ISSN":["0920-5691","1573-1405"],"issn-type":[{"value":"0920-5691","type":"print"},{"value":"1573-1405","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,6]]},"assertion":[{"value":"15 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that the publication of this paper has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}