{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T03:40:25Z","timestamp":1771645225189,"version":"3.50.1"},"reference-count":72,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T00:00:00Z","timestamp":1717977600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T00:00:00Z","timestamp":1717977600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Vis"],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s11263-024-02132-5","type":"journal-article","created":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T18:01:40Z","timestamp":1718042500000},"page":"5330-5345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["CG-FAS: Cross-label Generative Augmentation for Face Anti-Spoofing"],"prefix":"10.1007","volume":"132","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5504-7947","authenticated-orcid":false,"given":"Xing","family":"Liu","sequence":"first","affiliation":[]},{"given":"Anyang","family":"Su","sequence":"additional","affiliation":[]},{"given":"Minghui","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zitong","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Kangle","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Da","family":"An","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Mengzhen","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Chenxu","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Lei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,10]]},"reference":[{"key":"2132_CR1","doi-asserted-by":"crossref","unstructured":"Abdal, R., Qin, Y., & Wonka, P. (2019). Image2StyleGAN: How to embed images into the StyleGAN latent space? In Proceedings of the IEEE\/CVF international conference on computer vision, pp. 4432\u20134441.","DOI":"10.1109\/ICCV.2019.00453"},{"key":"2132_CR2","doi-asserted-by":"crossref","unstructured":"Abdal, R., Qin, Y., & Wonka, P.\u00a0A. (2020). Image2StyleGAN++: How to edit the embedded images? In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 8296\u20138305.","DOI":"10.1109\/CVPR42600.2020.00832"},{"key":"2132_CR3","unstructured":"Arjovsky, M., Chintala, S., & Bottou, L. (2017). Wasserstein generative adversarial networks. In International conference on machine learning, PMLR. pp. 214\u2013223."},{"key":"2132_CR4","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., & Hadid, A. (2015). Face anti-spoofing based on color texture analysis. In International conference on image processing (ICIP).","DOI":"10.1109\/ICIP.2015.7351280"},{"issue":"2","key":"2132_CR5","first-page":"141","volume":"24","author":"Z Boulkenafet","year":"2017","unstructured":"Boulkenafet, Z., Komulainen, J., & Hadid, A. (2017). Face antispoofing using speeded-up robust features and fisher vector encoding. IEEE Signal Processing Letters, 24(2), 141\u2013145.","journal-title":"IEEE Signal Processing Letters"},{"key":"2132_CR6","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., Li, L., Feng, X., & Hadid, A. (2017b). OULU-NPU: A mobile face presentation attack database with real-world variations. In FGR, pp. 612\u2013618.","DOI":"10.1109\/FG.2017.77"},{"key":"2132_CR7","unstructured":"Brock, A., Donahue, J., & Simonyan, K. (2018). Large scale GAN training for high fidelity natural image synthesis. In International conference on learning representations."},{"key":"2132_CR8","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., & Zafeiriou, S. (2019). ArcFace: Additive angular margin loss for deep face recognition. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 4690\u20134699.","DOI":"10.1109\/CVPR.2019.00482"},{"key":"2132_CR9","unstructured":"Diederik, P, K. & Max, W. (2014). Auto-encoding variational bayes. International conference on learning representation."},{"key":"2132_CR10","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer, M., Heigold, G., Gelly, S., Uszkoreit, J., & Houlsby, N. (2021). An image is worth 16x16 words: Transformers for image recognition at scale. ICLR."},{"key":"2132_CR11","doi-asserted-by":"publisher","first-page":"1535","DOI":"10.1109\/TIFS.2023.3337970","volume":"19","author":"H Fang","year":"2024","unstructured":"Fang, H., Liu, A., Wan, J., Escalera, S., Zhao, C., Zhang, X., Li, S. Z., & Lei, Z. (2024a). Surveillance face anti-spoofing. IEEE Transactions on Information Forensics and Security, 19, 1535\u20131546.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2132_CR12","doi-asserted-by":"crossref","unstructured":"Fang, H., Liu, A., Yuan, H., Zheng, J., Zeng, D., Liu, Y., Deng, J., Escalera, S., Liu, X., Wan, J., & Lei, Z. (2024b). Unified physical-digital face attack detection.","DOI":"10.24963\/ijcai.2024\/83"},{"key":"2132_CR13","doi-asserted-by":"crossref","unstructured":"Fang, M., Damer, N., Kirchbuchner, F., & Kuijper, A. (2022). Learnable multi-level frequency decomposition and hierarchical attention mechanism for generalized face presentation attack detection. In Proceedings of the IEEE\/CVF winter conference on applications of computer vision.","DOI":"10.1109\/WACV51458.2022.00120"},{"key":"2132_CR14","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., & Bengio, Y. (2014). Generative adversarial nets. Advances in Neural Information Processing Systems, 27."},{"key":"2132_CR15","first-page":"9841","volume":"33","author":"E H\u00e4rk\u00f6nen","year":"2020","unstructured":"H\u00e4rk\u00f6nen, E., Hertzmann, A., Lehtinen, J., & Paris, S. (2020). GANSpace: Discovering interpretable GAN controls. Advances in Neural Information Processing Systems, 33, 9841\u20139850.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"2132_CR16","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., & Sun, J. (2016a). Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770\u2013778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"2132_CR17","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., & Sun, J. (2016b). Deep residual learning for image recognition. In CVPR.","DOI":"10.1109\/CVPR.2016.90"},{"key":"2132_CR18","unstructured":"Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., & Hochreiter, S. (2017). GANs trained by a two time-scale update rule converge to a local nash equilibrium. Advances in Neural Information Processing Systems, 30."},{"key":"2132_CR19","doi-asserted-by":"crossref","unstructured":"Isola, P., Zhu, J.-Y., Zhou, T., & Efros, A.\u00a0A. (2017). Image-to-image translation with conditional adversarial networks. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 1125\u20131134.","DOI":"10.1109\/CVPR.2017.632"},{"key":"2132_CR20","doi-asserted-by":"crossref","unstructured":"Jourabloo, A., Liu, Y., & Liu, X. (2018). Face de-spoofing: Anti-spoofing via noise modeling. In ECCV.","DOI":"10.1007\/978-3-030-01261-8_18"},{"key":"2132_CR21","unstructured":"Karras, T., Aila, T., Laine, S., & Lehtinen, J. (2018). Progressive growing of GANs for improved quality, stability, and variation. In International conference on learning representations."},{"key":"2132_CR22","first-page":"12104","volume":"33","author":"T Karras","year":"2020","unstructured":"Karras, T., Aittala, M., Hellsten, J., Laine, S., Lehtinen, J., & Aila, T. (2020). Training generative adversarial networks with limited data. Advances in Neural Information Processing Systems, 33, 12104\u201312114.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"2132_CR23","unstructured":"Karras, T., Aittala, M., Laine, S., H\u00e4rk\u00f6nen, E., Hellsten, J., Lehtinen, J., & Aila, T. (2021). Alias-free generative adversarial networks. Advances in Neural Information Processing Systems, 34."},{"key":"2132_CR24","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., & Aila, T. (2019). A style-based generator architecture for generative adversarial networks. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 4401\u20134410.","DOI":"10.1109\/CVPR.2019.00453"},{"key":"2132_CR25","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aittala, M., Hellsten, J., Lehtinen, J., & Aila, T. (2020b). Analyzing and improving the image quality of StyleGAN. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 8110\u20138119.","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"2132_CR26","doi-asserted-by":"crossref","unstructured":"Komulainen, J., Hadid, A., & Pietik\u00e4inen, M. (2013). Context based face anti-spoofing. In 2013 IEEE sixth international conference on biometrics: Theory, applications and systems (BTAS), pp. 1\u20138.","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"2132_CR27","unstructured":"Ling, H., Kreis, K., Li, D., Kim, S.\u00a0W., Torralba, A., & Fidler, S. (2021). EditGAN: High-precision semantic image editing. Advances in Neural Information Processing Systems, 34."},{"key":"2132_CR28","doi-asserted-by":"crossref","unstructured":"Liu, A., Tan, Z., Escalera, S., Guo, G., & Li, S.\u00a0Z. (2021a). CASIA-SURF CeFA : A Benchmark for Multi-modal Cross-ethnicity Face Anti-spoofing. Proceedings of the IEEE\/CVF winter conference on applications of computer vision (WACV),, pp. 1179\u20131187.","DOI":"10.1109\/WACV48630.2021.00122"},{"key":"2132_CR29","doi-asserted-by":"crossref","unstructured":"Liu, A., Zhao, C., Yu, Z., Su, A., Liu, X., Kong, Z., Wan, J., Escalera, S., Escalante, H.\u00a0J., Lei, Z., et\u00a0al. (2021b). 3D high-fidelity mask face presentation attack detection challenge. In Proceedings of the IEEE\/CVF international conference on computer vision(ICCV) workshops, pp. 814\u2013823.","DOI":"10.1109\/ICCVW54120.2021.00096"},{"key":"2132_CR30","doi-asserted-by":"publisher","first-page":"2497","DOI":"10.1109\/TIFS.2022.3188149","volume":"17","author":"A Liu","year":"2022","unstructured":"Liu, A., Zhao, C., Yu, Z., Wan, J., Su, A., Liu, X., Tan, Z., Escalera, S., Xing, J., Liang, Y., et al. (2022). Contrastive context-aware learning for 3D high-fidelity mask face presentation attack detection. IEEE Transactions on Information Forensics and Security, 17, 2497\u20132507.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2132_CR31","doi-asserted-by":"crossref","unstructured":"Liu, S., Yang, B., Yuen, P.\u00a0C., & Zhao, G. (2016). A 3D mask face anti-spoofing database with real world variations. In Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp. 100\u2013106.","DOI":"10.1109\/CVPRW.2016.193"},{"key":"2132_CR32","doi-asserted-by":"crossref","unstructured":"Liu, Y., Jourabloo, A., & Liu, X. (2018a). Learning deep models for face anti-spoofing: Binary or auxiliary supervision. In CVPR.","DOI":"10.1109\/CVPR.2018.00048"},{"key":"2132_CR33","doi-asserted-by":"crossref","unstructured":"Liu, Y., Jourabloo, A., & Liu, X. (2018b). Learning deep models for face anti-spoofing: Binary or auxiliary supervision. In CVPR.","DOI":"10.1109\/CVPR.2018.00048"},{"key":"2132_CR34","doi-asserted-by":"crossref","unstructured":"Liu, Y., Stehouwer, J., Jourabloo, A., & Liu, X. (2019). Deep tree learning for zero-shot face anti-spoofing. In CVPR.","DOI":"10.1109\/CVPR.2019.00481"},{"key":"2132_CR35","doi-asserted-by":"crossref","unstructured":"Liu, Y., Stehouwer, J., & Liu, X. (2020). On disentangling spoof trace for generic face anti-spoofing. In ECCV.","DOI":"10.1007\/978-3-030-58523-5_24"},{"key":"2132_CR36","doi-asserted-by":"crossref","unstructured":"Lucena, O., Junior, A., Moia, V., Souza, R., Valle, E., & Lotufo, R. (2017). Transfer learning using convolutional neural networks for face anti-spoofing. In International conference image analysis and recognition, pp. 27\u201334.","DOI":"10.1007\/978-3-319-59876-5_4"},{"issue":"4","key":"2132_CR37","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1109\/TIFS.2015.2398817","volume":"10","author":"D Menotti","year":"2015","unstructured":"Menotti, D., Chiachia, G., Pinto, A., Schwartz, W. R., Pedrini, H., Falcao, A. X., & Rocha, A. (2015). Deep representations for iris, face, and fingerprint spoofing detection. IEEE Transactions on Information Forensics and Security, 10(4), 864\u2013879.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2132_CR38","unstructured":"Miyato, T., Kataoka, T., Koyama, M., & Yoshida, Y. (2018). Spectral normalization for generative adversarial networks. In International conference on learning representations."},{"key":"2132_CR39","doi-asserted-by":"crossref","unstructured":"Nagpal, C. & Dubey, S.\u00a0R. (2019). A performance evaluation of convolutional neural networks for face anti spoofing. In 2019 international joint conference on neural networks (IJCNN), pp. 1\u20138. IEEE.","DOI":"10.1109\/IJCNN.2019.8852422"},{"key":"2132_CR40","doi-asserted-by":"crossref","unstructured":"Patashnik, O., Wu, Z., Shechtman, E., Cohen-Or, D., & Lischinski, D. (2021). StyleCLIP: Text-driven manipulation of StyleGAN imagery. In Proceedings of the IEEE\/CVF international conference on computer vision, pp. 2085\u20132094.","DOI":"10.1109\/ICCV48922.2021.00209"},{"issue":"10","key":"2132_CR41","doi-asserted-by":"publisher","first-page":"2268","DOI":"10.1109\/TIFS.2016.2578288","volume":"11","author":"K Patel","year":"2016","unstructured":"Patel, K., Han, H., & Jain, A. K. (2016). Secure face unlock: Spoof detection on smartphones. IEEE Transactions on Information Forensics & Security, 11(10), 2268\u20132283.","journal-title":"IEEE Transactions on Information Forensics & Security"},{"key":"2132_CR42","unstructured":"Radford, A., Kim, J.\u00a0W., Hallacy, C., Ramesh, A., Goh, G., Agarwal, S., Sastry, G., Askell, A., Mishkin, P., Clark, J., et\u00a0al. (2021). Learning transferable visual models from natural language supervision. In International conference on machine learning, PMLR. pp. 8748\u20138763."},{"key":"2132_CR43","unstructured":"Radford, A., Metz, L., & Chintala, S. (2016). Unsupervised representation learning with deep convolutional generative adversarial networks. In International conference on learning representations."},{"key":"2132_CR44","doi-asserted-by":"crossref","unstructured":"Richardson, E., Alaluf, Y., Patashnik, O., Nitzan, Y., Azar, Y., Shapiro, S., & Cohen-Or, D. (2021). Encoding in style: a StyleGAN encoder for image-to-image translation. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 2287\u20132296.","DOI":"10.1109\/CVPR46437.2021.00232"},{"key":"2132_CR45","doi-asserted-by":"crossref","unstructured":"Rombach, R., Blattmann, A., Lorenz, D., Esser, P., & Ommer, B. (2022). High-resolution image synthesis with latent diffusion models. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 10684\u201310695.","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"2132_CR46","doi-asserted-by":"crossref","unstructured":"Ronneberger, O., Fischer, P., & Brox, T. (2015). U-net: Convolutional networks for biomedical image segmentation. In International conference on medical image computing and computer-assisted intervention, Springer. pp. 234\u2013241.","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"2132_CR47","doi-asserted-by":"crossref","unstructured":"Ruiz, N., Li, Y., Jampani, V., Pritch, Y., Rubinstein, M., & Aberman, K. (2023). DreamBooth: Fine tuning text-to-image diffusion models for subject-driven generation. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 22500\u201322510.","DOI":"10.1109\/CVPR52729.2023.02155"},{"key":"2132_CR48","doi-asserted-by":"crossref","unstructured":"Shao, R., Lan, X., & Yuen, P.\u00a0C. (2017). Deep convolutional dynamic texture learning with adaptive channel-discriminability for 3D mask face anti-spoofing. In IJCB, pp. 748\u2013755.","DOI":"10.1109\/BTAS.2017.8272765"},{"key":"2132_CR49","doi-asserted-by":"crossref","unstructured":"Shen, Y., Gu, J., Tang, X., & Zhou, B. (2020a). Interpreting the latent space of GANs for semantic face editing. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 9243\u20139252.","DOI":"10.1109\/CVPR42600.2020.00926"},{"issue":"4","key":"2132_CR50","doi-asserted-by":"publisher","first-page":"2004","DOI":"10.1109\/TPAMI.2020.3034267","volume":"44","author":"Y Shen","year":"2020","unstructured":"Shen, Y., Yang, C., Tang, X., & Zhou, B. (2020b). InterFaceGAN: Interpreting the disentangled face representation learned by GANs. IEEE Transactions on Pattern Analysis and Machine Intelligence., 44(4), 2004\u20132018.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence."},{"key":"2132_CR51","unstructured":"Sohl-Dickstein, J., Weiss, E., Maheswaranathan, N., & Ganguli, S. (2015). Deep unsupervised learning using nonequilibrium thermodynamics. In International conference on machine learning, PMLR. pp. 2256\u20132265."},{"key":"2132_CR52","doi-asserted-by":"crossref","unstructured":"Sun, Y., Liu, Y., Liu, X., Li, Y., & Chu, W.-S. (2023). Rethinking domain generalization for face anti-spoofing: Separability and alignment. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 24563\u201324574.","DOI":"10.1109\/CVPR52729.2023.02353"},{"key":"2132_CR53","doi-asserted-by":"crossref","unstructured":"Tiago, D., Anjos, A., Martino, J.\u00a0D., & Marcel, S. (2013). Can face anti-spoofing countermeasures work in a real world scenario? In International conference on biometrics, pp. 1\u20138.","DOI":"10.1109\/ICB.2013.6612981"},{"issue":"4","key":"2132_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3450626.3459838","volume":"40","author":"O Tov","year":"2021","unstructured":"Tov, O., Alaluf, Y., Nitzan, Y., Patashnik, O., & Cohen-Or, D. (2021). Designing an encoder for StyleGAN image manipulation. ACM Transactions on Graphics (TOG), 40(4), 1\u201314.","journal-title":"ACM Transactions on Graphics (TOG)"},{"key":"2132_CR55","unstructured":"Van\u00a0Oord, A., Kalchbrenner, N., & Kavukcuoglu, K. (2016). Pixel recurrent neural networks. In International conference on machine learning, PMLR. pp. 1747\u20131756."},{"key":"2132_CR56","doi-asserted-by":"crossref","unstructured":"Wang, C.-Y., Lu, Y.-D., Yang, S.-T., & Lai, S.-H. (2022a). PatchNet: A simple face anti-spoofing framework via fine-grained patch recognition. In CVPR.","DOI":"10.1109\/CVPR52688.2022.01964"},{"key":"2132_CR57","doi-asserted-by":"crossref","unstructured":"Wang, Z., Wang, Z., Yu, Z., Deng, W., Li, J., Gao, T., & Wang, Z. (2022b). Domain generalization via shuffled style assembly for face anti-spoofing. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 4123\u20134133.","DOI":"10.1109\/CVPR52688.2022.00409"},{"key":"2132_CR58","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.1109\/TIFS.2023.3235581","volume":"18","author":"Z Wang","year":"2023","unstructured":"Wang, Z., Yu, Z., Wang, X., Qin, Y., Li, J., Zhao, C., Liu, X., & Lei, Z. (2023). Consistency regularization for deep face anti-spoofing. IEEE Transactions on Information Forensics and Security, 18, 1127\u20131140.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2132_CR59","doi-asserted-by":"crossref","unstructured":"Wang, Z., Yu, Z., Zhao, C., Zhu, X., Qin, Y., Zhou, Q., Zhou, F., & Lei, Z. (2020). Deep spatial gradient and temporal depth learning for face anti-spoofing. In CVPR.","DOI":"10.1109\/CVPR42600.2020.00509"},{"issue":"7","key":"2132_CR60","doi-asserted-by":"publisher","first-page":"4626","DOI":"10.1109\/TCSVT.2021.3133620","volume":"32","author":"H Wu","year":"2021","unstructured":"Wu, H., Zeng, D., Hu, Y., Shi, H., & Mei, T. (2021). Dual spoof disentanglement generation for face anti-spoofing with depth uncertainty learning. IEEE Transactions on Circuits and Systems for Video Technology, 32(7), 4626\u20134638.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"2132_CR61","doi-asserted-by":"crossref","unstructured":"Wu, Z., Lischinski, D., & Shechtman, E. (2021b). StyleSpace analysis: Disentangled controls for StyleGAN image generation. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 12863\u201312872.","DOI":"10.1109\/CVPR46437.2021.01267"},{"key":"2132_CR62","doi-asserted-by":"crossref","unstructured":"Xia, W., Zhang, Y., Yang, Y., Xue, J. -H., Zhou, B., & Yang, M. -H. (2021). GAN inversion: A survey. arXiv:2101.05278.","DOI":"10.1109\/TPAMI.2022.3181070"},{"key":"2132_CR63","doi-asserted-by":"crossref","unstructured":"Xu, Z., Li, S., & Deng, W. (2015). Learning temporal features using LSTM-CNN architecture for face anti-spoofing. In ACPR, pp. 141\u2013145.","DOI":"10.1109\/ACPR.2015.7486482"},{"key":"2132_CR64","doi-asserted-by":"crossref","unstructured":"Yang, X., Luo, W., Bao, L., Gao, Y., Gong, D., Zheng, S., Li, Z., & Liu, W. (2019). Face anti-spoofing: Model matters, so does data. In CVPR.","DOI":"10.1109\/CVPR.2019.00362"},{"key":"2132_CR65","doi-asserted-by":"crossref","unstructured":"Yu, Z., Li, X., Niu, X., Shi, J., & Zhao, G. (2020). Face anti-spoofing with human material perception. In ECCV, Springer. pp. 557\u2013575.","DOI":"10.1007\/978-3-030-58571-6_33"},{"issue":"5","key":"2132_CR66","first-page":"5609","volume":"45","author":"Z Yu","year":"2022","unstructured":"Yu, Z., Qin, Y., Li, X., Zhao, C., Lei, Z., & Zhao, G. (2022). Deep learning for face anti-spoofing: A survey. IEEE Transactions on Pattern Analysis and Machine Intelligence, 45(5), 5609\u20135631.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"2132_CR67","doi-asserted-by":"crossref","unstructured":"Yu, Z., Qin, Y., Zhao, H., Li, X., & Zhao, G. (2021). Dual-cross central difference network for face anti-spoofing. arXiv:2105.01290.","DOI":"10.24963\/ijcai.2021\/177"},{"key":"2132_CR68","doi-asserted-by":"crossref","unstructured":"Yu, Z., Wan, J., Qin, Y., Li, X., Li, S. Z., & Zhao, G. (2020). NAS-FAS: Static-dynamic central difference network search for face anti-spoofing. IEEE Transactions on Pattern Analysis and Machine Intelligence, 43(9), 3005\u20133023.","DOI":"10.1109\/TPAMI.2020.3036338"},{"key":"2132_CR69","doi-asserted-by":"crossref","unstructured":"Yu, Z., Zhao, C., Wang, Z., Qin, Y., Su, Z., Li, X., Zhou, F., & Zhao, G. (2020). Searching central difference convolutional networks for face anti-spoofing. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition.","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"2132_CR70","doi-asserted-by":"crossref","unstructured":"Zhang, K.-Y., Yao, T., Zhang, J., Liu, S., Yin, B., Ding, S., & Li, J. (2021). Structure destruction and content combination for face anti-spoofing. In IJCB.","DOI":"10.1109\/IJCB52358.2021.9484395"},{"key":"2132_CR71","doi-asserted-by":"crossref","unstructured":"Zhang, R., Isola, P., Efros, A.\u00a0A., Shechtman, E., & Wang, O. (2018). The unreasonable effectiveness of deep features as a perceptual metric. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 586\u2013595.","DOI":"10.1109\/CVPR.2018.00068"},{"key":"2132_CR72","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Yin, Z., Li, Y., Yin, G., Yan, J., Shao, J., & Liu, Z. (2020). CelebA-Spoof: Large-scale face anti-spoofing dataset with rich annotations. In European conference on computer vision, Springer. pp. 70\u201385.","DOI":"10.1007\/978-3-030-58610-2_5"}],"container-title":["International Journal of Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-024-02132-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11263-024-02132-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-024-02132-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T05:19:33Z","timestamp":1729919973000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11263-024-02132-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,10]]},"references-count":72,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["2132"],"URL":"https:\/\/doi.org\/10.1007\/s11263-024-02132-5","relation":{},"ISSN":["0920-5691","1573-1405"],"issn-type":[{"value":"0920-5691","type":"print"},{"value":"1573-1405","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,10]]},"assertion":[{"value":"31 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}