{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:12:26Z","timestamp":1774602746649,"version":"3.50.1"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T00:00:00Z","timestamp":1769644800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T00:00:00Z","timestamp":1769644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012165","name":"Key Technologies Research and Development Program","doi-asserted-by":"publisher","award":["2021YFF0602103"],"award-info":[{"award-number":["2021YFF0602103"]}],"id":[{"id":"10.13039\/501100012165","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Vis"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s11263-025-02673-3","type":"journal-article","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T08:54:58Z","timestamp":1769676898000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["UniAttack: Unified Physical-Digital Face Attack Detection"],"prefix":"10.1007","volume":"134","author":[{"given":"Shunxin","family":"Chen","sequence":"first","affiliation":[]},{"given":"Ajian","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Haocheng","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Junze","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Dingheng","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Yanhong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jiankang","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Escalera","sequence":"additional","affiliation":[]},{"given":"Xiaoming","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4735-2885","authenticated-orcid":false,"given":"Jun","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Lei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,29]]},"reference":[{"key":"2673_CR1","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., Li, L., Feng, X., & Hadid, A. (2017). Oulu-npu: A mobile face presentation attack database with real-world variations. In FG, pp. 612\u2013618.","DOI":"10.1109\/FG.2017.77"},{"key":"2673_CR2","doi-asserted-by":"crossref","unstructured":"Cai, R., Cui, Y., Yu, Z., Lin, X., Chen, C., & Kot, A. (2025). Rehearsal-free and efficient continual learning for cross-domain face anti-spoofing. IEEE Transactions on Pattern Analysis and Machine Intelligence.","DOI":"10.1109\/TPAMI.2025.3601053"},{"issue":"4","key":"2673_CR3","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1007\/s11263-024-02240-2","volume":"133","author":"R Cai","year":"2025","unstructured":"Cai, R., Soh, C., Yu, Z., Li, H., Yang, W., & Kot, A. C. (2025). Towards data-centric face anti-spoofing: Improving cross-domain generalization via physics-based data synthesis. International Journal of Computer Vision, 133(4), 1689\u20131710.","journal-title":"International Journal of Computer Vision"},{"key":"2673_CR4","doi-asserted-by":"publisher","first-page":"8385","DOI":"10.1109\/TIFS.2024.3420699","volume":"19","author":"R Cai","year":"2024","unstructured":"Cai, R., Yu, Z., Kong, C., Li, H., Chen, C., Hu, Y., & Kot, A. C. (2024). S-adapter: Generalizing vision transformer for face anti-spoofing with statistical tokens. IEEE Transactions on Information Forensics and Security, 19, 8385\u20138397.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2673_CR5","doi-asserted-by":"crossref","unstructured":"Chen, R., Chen, X., Ni, B., & Ge, Y. (2020). Simswap: An efficient framework for high fidelity face swapping. In ACM MM, pp. 2003\u20132011.","DOI":"10.1145\/3394171.3413630"},{"key":"2673_CR6","doi-asserted-by":"crossref","unstructured":"Chen, S., Liu, A., Zheng, J., Wan, J., Peng, K., Escalera, S., & Lei, Z. (2025). Mixture-of-attack-experts with class regularization for unified physical-digital face attack detection. In Proceedings of the AAAI Conference on Artificial Intelligence, vol. 39, pp. 2195\u20132203.","DOI":"10.1609\/aaai.v39i2.32218"},{"key":"2673_CR7","doi-asserted-by":"crossref","unstructured":"Choi, Y., Choi, M., Kim, M., Ha, J.-W., Kim, S., & Choo, J. (2018). StarGAN: Unified Generative Adversarial Networks for Multi-Domain Image-to-Image Translation.","DOI":"10.1109\/CVPR.2018.00916"},{"key":"2673_CR8","doi-asserted-by":"crossref","unstructured":"Chollet, F. (2017). Xception: Deep learning with depthwise separable convolutions. In CVPR, pp. 1251\u20131258.","DOI":"10.1109\/CVPR.2017.195"},{"key":"2673_CR9","doi-asserted-by":"crossref","unstructured":"Dabouei, A., Soleymani, S., Dawson, J., & Nasrabadi, N. (2019). Fast geometrically-perturbed adversarial faces. In WACV, pp. 1979\u20131988. IEEE.","DOI":"10.1109\/WACV.2019.00215"},{"key":"2673_CR10","doi-asserted-by":"crossref","unstructured":"Dang, H., Liu, F., Stehouwer, J., Liu, X., & Jain, A. K. (2020). On the detection of digital face manipulation. In CVPR, pp. 5781\u20135790.","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"2673_CR11","doi-asserted-by":"crossref","unstructured":"Deb, D., Liu, X., & Jain, A. K. (2023). Unified detection of digital and physical face attacks. In FG, pp. 1\u20138. IEEE.","DOI":"10.1109\/FG57933.2023.10042500"},{"key":"2673_CR12","doi-asserted-by":"crossref","unstructured":"Deb, D., Zhang, J., & Jain, A. K. (2019). AdvFaces: Adversarial Face Synthesis.","DOI":"10.1109\/IJCB48548.2020.9304898"},{"key":"2673_CR13","doi-asserted-by":"crossref","unstructured":"Ding, X., Raziei, Z., Larson, E. C., Olinick, E. V., Krueger, P., & Hahsler, M. (2020). Swapped face detection using deep learning and subjective assessment. EURASIP JIS, 1\u201312.","DOI":"10.1186\/s13635-020-00109-8"},{"key":"2673_CR14","doi-asserted-by":"crossref","unstructured":"Dong, X., Bao, J., Chen, D., Zhang, T., Zhang, W., Yu, N., Chen, D., Wen, F., & Guo, B. (2022). Protecting celebrities from deepfake with identity consistency transformer. In CVPR, pp. 9468\u20139478.","DOI":"10.1109\/CVPR52688.2022.00925"},{"key":"2673_CR15","doi-asserted-by":"crossref","unstructured":"Duan, R., Chen, Y., Niu, D., Yang, Y., Qin, A. K., & He, Y. (2021). Advdrop: Adversarial attack to dnns by dropping information. In ICCV, pp 7506\u20137515.","DOI":"10.1109\/ICCV48922.2021.00741"},{"key":"2673_CR16","unstructured":"Fang, H., Liu, A., Yuan, H., Zheng, J., Zeng, D., Liu, Y., Deng, J., Escalera, S., Liu, X., & Wan, J. (2024). Unified physical-digital face attack detection. arXiv preprintarXiv:2401.17699."},{"key":"2673_CR17","first-page":"1535","volume":"19","author":"H Fang","year":"2023","unstructured":"Fang, H., Liu, A., Wan, J., Escalera, S., Zhao, C., Zhang, X., Li, S. Z., & Lei, Z. (2023). Surveillance face anti-spoofing. TIFS, 19, 1535\u20131546.","journal-title":"Surveillance face anti-spoofing. TIFS"},{"key":"2673_CR18","unstructured":"Frank, J., Eisenhofer, T., Sch\u00f6nherr, L., Fischer, A., Kolossa, D., & Holz, T. (2020). Leveraging frequency analysis for deep fake image recognition. In ICML, pp. 3247\u20133258."},{"key":"2673_CR19","unstructured":"Goodfellow, I. J., Shlens, J., & Szegedy, C. (2014). Explaining and harnessing adversarial examples. CoRR arxiv:1412.6572."},{"key":"2673_CR20","doi-asserted-by":"crossref","unstructured":"Heusch, G., George, A., Geissbuhler, D., Mostaani, Z., & Marcel, S. (2020). Deep models and shortwave infrared information to detect face presentation attacks. TBIOM, 1\u20131.","DOI":"10.1109\/TBIOM.2020.3010312"},{"key":"2673_CR21","doi-asserted-by":"crossref","unstructured":"Hong, F. -T., Zhang, L., Shen, L., & Xu, D. (2022). Depth-aware generative adversarial network for talking head video generation. In CVPR.","DOI":"10.1109\/CVPR52688.2022.00339"},{"key":"2673_CR22","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aittala, M., Hellsten, J., Lehtinen, J., & Aila, T. (2020). Analyzing and improving the image quality of StyleGAN. In CVPR.","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"2673_CR23","doi-asserted-by":"crossref","unstructured":"Khattak, M. U., Rasheed, H., Maaz, M., Khan, S., & Khan, F. S. (2023). Maple: Multi-modal prompt learning. In CVPR, pp. 19113\u201319122.","DOI":"10.1109\/CVPR52729.2023.01832"},{"key":"2673_CR24","doi-asserted-by":"crossref","unstructured":"Komulainen, J., Hadid, A., & Pietik\u00e4inen, M. (2013) Context based face anti-spoofing. In BTAS, pp. 1\u20138.","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"2673_CR25","unstructured":"Korshunov, P., & Marcel, S. (2018). Deepfakes: a new threat to face recognition? assessment and detection. arXiv:1812.08685."},{"key":"2673_CR26","unstructured":"Kowalski, M. (2018). Faceswap github. Faceswap github\",[online] Available: https:\/\/github.com\/MarekKowalski\/FaceSwap"},{"key":"2673_CR27","doi-asserted-by":"crossref","unstructured":"Lai, Y., Yu, Z., Yang, J., Li, B., Kang, X., & Shen, L. (2024). Gm-df: Generalized multi-scenario deepfake detection. arXiv preprint arXiv:2406.20078.","DOI":"10.1145\/3746027.3755386"},{"key":"2673_CR28","doi-asserted-by":"crossref","unstructured":"Li, H., Li, W., Cao, H., Wang, S., Huang, F., & Kot, A. C. (2018). Unsupervised domain adaptation for face anti-spoofing. TIFS.","DOI":"10.1109\/TIFS.2018.2801312"},{"key":"2673_CR29","doi-asserted-by":"crossref","unstructured":"Lin, X., Liu, A., Yu, Z., Cai, R., Wang, S., Yu, Y., Wan, J., Lei, Z., Cao, X., & Kot, A. (2025). Reliable and balanced transfer learning for generalized multimodal face anti-spoofing. IEEE Transactions on Pattern Analysis and Machine Intelligence.","DOI":"10.1109\/TPAMI.2025.3573785"},{"key":"2673_CR30","doi-asserted-by":"crossref","unstructured":"Lin, X., Wang, S., Cai, R., Liu, Y., Fu, Y., Tang, W., Yu, Z., & Kot, A. (2024). Suppress and rebalance: Towards generalized multi-modal face anti-spoofing. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 211\u2013221.","DOI":"10.1109\/CVPR52733.2024.00028"},{"key":"2673_CR31","doi-asserted-by":"crossref","unstructured":"Liu, A., & Liang, Y. (2022). Ma-vit: Modality-agnostic vision transformers for face anti-spoofing. In IJCAI, pp. 1180\u20131186.","DOI":"10.24963\/ijcai.2022\/165"},{"key":"2673_CR32","doi-asserted-by":"crossref","unstructured":"Liu, M., Ding, Y., Xia, M., Liu, X., Ding, E., Zuo, W., & Wen, S. (2019). Stgan: A unified selective transfer network for arbitrary image attribute editing. In CVPR, pp. 3673\u20133682.","DOI":"10.1109\/CVPR.2019.00379"},{"key":"2673_CR33","doi-asserted-by":"crossref","unstructured":"Liu, Y., Jourabloo, A., & Liu, X. (2018). Learning deep models for face anti-spoofing: Binary or auxiliary supervision. In CVPR.","DOI":"10.1109\/CVPR.2018.00048"},{"key":"2673_CR34","doi-asserted-by":"crossref","unstructured":"Liu, Y., Stehouwer, J., Jourabloo, A., & Liu, X. (2019). Deep tree learning for zero-shot face anti-spoofing. In CVPR.","DOI":"10.1109\/CVPR.2019.00481"},{"key":"2673_CR35","doi-asserted-by":"crossref","unstructured":"Liu, H., Tan, Z., Chen, Q., Wei, Y., Zhao, Y., & Wang, J. (2023). Unified frequency-assisted transformer framework for detecting and grounding multi-modal manipulation. arXiv preprint arXiv:2309.09667.","DOI":"10.1007\/s11263-024-02245-x"},{"key":"2673_CR36","doi-asserted-by":"crossref","unstructured":"Liu, A., Tan, Z., Liang, Y., & Wan, J. (2023). Attack-agnostic deep face anti-spoofing. In CVPR Workshops, pp. 6335\u20136344.","DOI":"10.1109\/CVPRW59228.2023.00674"},{"key":"2673_CR37","doi-asserted-by":"crossref","unstructured":"Liu, H., Tan, Z., Tan, C., Wei, Y., Wang, J., & Zhao, Y. (2024). Forgery-aware adaptive transformer for generalizable synthetic image detection. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10770\u201310780.","DOI":"10.1109\/CVPR52733.2024.01024"},{"key":"2673_CR38","doi-asserted-by":"crossref","unstructured":"Liu, A., Tan, Z., Wan, J., Escalera, S., Guo, G., & Li, S. Z. (2021). Casia-surf cefa: A benchmark for multi-modal cross-ethnicity face anti-spoofing. In WACV, pp. 1179\u20131187.","DOI":"10.1109\/WACV48630.2021.00122"},{"key":"2673_CR39","doi-asserted-by":"crossref","unstructured":"Liu, A., Wan, J., Jiang, N., Wang, H., & Liang, Y. (2022). Disentangling facial pose and appearance information for face anti-spoofing. In ICPR, pp. 4537\u20134543. IEEE.","DOI":"10.1109\/ICPR56361.2022.9956674"},{"key":"2673_CR40","doi-asserted-by":"crossref","unstructured":"Liu, S., Yuen, P. C., Zhang, S., Zhao, G. (2016). 3d mask face anti-spoofing with remote photoplethysmography. In ECCV, pp. 85\u2013100. Springer","DOI":"10.1007\/978-3-319-46478-7_6"},{"key":"2673_CR41","first-page":"2759","volume":"16","author":"A Liu","year":"2021","unstructured":"Liu, A., Tan, Z., Wan, J., Liang, Y., Lei, Z., Guo, G., & Li, S. Z. (2021). Face anti-spoofing via adversarial cross-modality translation. TIFS, 16, 2759\u20132772.","journal-title":"TIFS"},{"key":"2673_CR42","first-page":"4775","volume":"18","author":"A Liu","year":"2023","unstructured":"Liu, A., Tan, Z., Yu, Z., Zhao, C., Wan, J., Liang, Y., Lei, Z., Zhang, D., Li, S., & Guo, G. (2023). Fm-vit: Flexible modal vision transformers for face anti-spoofing. TIFS, 18, 4775\u20134786.","journal-title":"TIFS"},{"key":"2673_CR43","first-page":"2497","volume":"17","author":"A Liu","year":"2022","unstructured":"Liu, A., Zhao, C., Yu, Z., Wan, J., Su, A., Liu, X., Tan, Z., Escalera, S., Xing, J., & Liang, Y. (2022). Contrastive context-aware learning for 3d high-fidelity mask face presentation attack detection. TIFS, 17, 2497\u20132507.","journal-title":"TIFS"},{"key":"2673_CR44","doi-asserted-by":"crossref","unstructured":"Luo, A., Cai, R., Kong, C., Ju, Y., Kang, X., Huang, J., & Life, A. C. K. (2024). Forgery-aware adaptive learning with vision transformer for generalized face forgery detection. IEEE Transactions on Circuits and Systems for Video Technology.","DOI":"10.1109\/TCSVT.2024.3522091"},{"key":"2673_CR45","doi-asserted-by":"crossref","unstructured":"Luo, C., Lin, Q., Xie, W., Wu, B., Xie, J., & Shen, L. (2022). Frequency-driven imperceptible adversarial attack on semantic similarity. In CVPR, pp. 15315\u201315324.","DOI":"10.1109\/CVPR52688.2022.01488"},{"key":"2673_CR46","doi-asserted-by":"crossref","unstructured":"M\u00e4\u00e4tt\u00e4, J., Hadid, A., & Pietik\u00e4inen, M. (2011). Face spoofing detection from single images using micro-texture analysis. In IJCB, pp. 1\u20137.","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"2673_CR47","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., & Vladu, A. (2019). Towards Deep Learning Models Resistant to Adversarial Attacks."},{"key":"2673_CR48","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S. -M., Fawzi, A., & Frossard, P. (2016). DeepFool: a simple and accurate method to fool deep neural networks.","DOI":"10.1109\/CVPR.2016.282"},{"key":"2673_CR49","doi-asserted-by":"crossref","unstructured":"Qiu, H., Xiao, C., Yang, L., Yan, X., Lee, H., & Li, B. (2020) SemanticAdv: Generating Adversarial Examples via Attribute-conditional Image Editing.","DOI":"10.1007\/978-3-030-58568-6_2"},{"key":"2673_CR50","unstructured":"Radford, A., Kim, J.W., Hallacy, C., Ramesh, A., Goh, G., Agarwal, S., Sastry, G., Askell, A., Mishkin, P., & Clark, J. (2021). Learning transferable visual models from natural language supervision. In International Conference on Machine Learning, pp. 8748\u20138763. PMLR."},{"key":"2673_CR51","doi-asserted-by":"crossref","unstructured":"Rony, J., Granger, E., Pedersoli, M., & Ben\u00a0Ayed, I. (2021). Augmented lagrangian adversarial attacks. In ICCV, pp. 7738\u20137747.","DOI":"10.1109\/ICCV48922.2021.00764"},{"key":"2673_CR52","doi-asserted-by":"crossref","unstructured":"Rosberg, F., Aksoy, E. E., Alonso-Fernandez, F., & Englund, C. (2023). Facedancer: pose-and occlusion-aware high fidelity face swapping. In: WACV, pp. 3454\u20133463.","DOI":"10.1109\/WACV56688.2023.00345"},{"key":"2673_CR53","doi-asserted-by":"crossref","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., & Nie\u00dfner, M. (2019). Faceforensics++: Learning to detect manipulated facial images. In ICCV, pp. 1\u201311.","DOI":"10.1109\/ICCV.2019.00009"},{"issue":"1","key":"2673_CR54","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s44267-025-00079-w","volume":"3","author":"Y Shi","year":"2025","unstructured":"Shi, Y., Gao, Y., Lai, Y., Wang, H., Feng, J., He, L., Wan, J., Chen, C., Yu, Z., & Cao, X. (2025). Shield: An evaluation benchmark for face spoofing and forgery detection with multimodal large language models. Visual Intelligence, 3(1), 9.","journal-title":"Visual Intelligence"},{"key":"2673_CR55","doi-asserted-by":"crossref","unstructured":"Thies, J., Zollh\u00f6fer, M., & Nie\u00dfner, M. (2019). Deferred neural rendering: Image synthesis using neural textures. Acm TOG, 1\u201312.","DOI":"10.1145\/3306346.3323035"},{"key":"2673_CR56","doi-asserted-by":"crossref","unstructured":"Thies, J., Zollhofer, M., Stamminger, M., Theobalt, C., Nie\u00dfner, M. (2016). Face2face: Real-time face capture and reenactment of rgb videos. In CVPR, pp. 2387\u20132395.","DOI":"10.1109\/CVPR.2016.262"},{"key":"2673_CR57","doi-asserted-by":"crossref","unstructured":"Wang, T. -C., Mallya, A., & Liu, M. -Y. (2021). One-shot free-view neural talking-head synthesis for video conferencing. In CVPR, pp. 10039\u201310049.","DOI":"10.1109\/CVPR46437.2021.00991"},{"key":"2673_CR58","doi-asserted-by":"crossref","unstructured":"Wang, Z., Wang, Z., Yu, Z., Deng, W., Li, J., Gao, T., & Wang, Z. (2022). Domain generalization via shuffled style assembly for face anti-spoofing. In CVPR, pp. 4123\u20134133.","DOI":"10.1109\/CVPR52688.2022.00409"},{"key":"2673_CR59","doi-asserted-by":"crossref","unstructured":"Wang, Y., Wu, S., Jiang, W., Hao, S., Tan, Y. -a., & Zhang, Q. (2021). Demiguise attack: Crafting invisible semantic adversarial perturbations with perceptual similarity. arXiv:2107.01396.","DOI":"10.24963\/ijcai.2021\/430"},{"key":"2673_CR60","doi-asserted-by":"crossref","unstructured":"Wang, Z., Yu, Z., Zhao, C., Zhu, X., Qin, Y., Zhou, Q., Zhou, F., & Lei, Z. (2020). Deep spatial gradient and temporal depth learning for face anti-spoofing. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5042\u20135051.","DOI":"10.1109\/CVPR42600.2020.00509"},{"key":"2673_CR61","doi-asserted-by":"crossref","unstructured":"Wang, Q., Zhang, L., & Li, B. (2021). Safa: Structure aware face animation. In 3DV, pp. 679\u2013688.","DOI":"10.1109\/3DV53792.2021.00077"},{"key":"2673_CR62","doi-asserted-by":"crossref","unstructured":"Xie, Z., Miao, C., Liu, A., Guo, J., Li, F., Guo, D., & Diao, Y. (2025). Suede: Shared unified experts for physical-digital face attack detection enhancement. arXiv preprint arXiv:2504.04818.","DOI":"10.1109\/ICME59968.2025.11209401"},{"key":"2673_CR63","unstructured":"Yan, C. W., Cheung, T. -H., & Yeung, D. -Y. (2022). Ila-da: Improving transferability of intermediate level attack with data augmentation. In ICLR."},{"key":"2673_CR64","unstructured":"Yang, J., Lin, X., Yu, Z., Zhang, L., Liu, X., Li, H., Yuan, X., & Cao, X. (2025). Dadm: Dual alignment of domain and modality for face anti-spoofing. arXiv preprint arXiv:2503.00429."},{"key":"2673_CR65","doi-asserted-by":"crossref","unstructured":"Yang, X., Luo, W., Bao, L., Gao, Y., Gong, D., Zheng, S., Li, Z., & Liu, W. (2019). Face anti-spoofing: Model matters, so does data. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3507\u20133516.","DOI":"10.1109\/CVPR.2019.00362"},{"key":"2673_CR66","unstructured":"Yu, Z., Cai, R., Li, Z., Yang, W., Shi, J., & Kot, A. C. (2022). Benchmarking joint face spoofing and forgery detection with visual and physiological cues. arXiv:2208.05401."},{"key":"2673_CR67","doi-asserted-by":"crossref","unstructured":"Yu, Z., Wan, J., Qin, Y., Li, X., Li, S. Z., & Zhao, G. (2020). Nas-fas: Static-dynamic central difference network search for face anti-spoofing. In TPAMI.","DOI":"10.24963\/ijcai.2021\/177"},{"key":"2673_CR68","doi-asserted-by":"crossref","unstructured":"Yu, Z., Zhao, C., Wang, Z., Qin, Y., Su, Z., Li, X., Zhou, F., & Zhao, G. (2020). Searching central difference convolutional networks for face anti-spoofing. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5295\u20135305.","DOI":"10.1109\/CVPR42600.2020.00534"},{"issue":"11","key":"2673_CR69","doi-asserted-by":"publisher","first-page":"5217","DOI":"10.1007\/s11263-024-02055-1","volume":"132","author":"Z Yu","year":"2024","unstructured":"Yu, Z., Cai, R., Cui, Y., Liu, X., Hu, Y., & Kot, A. C. (2024). Rethinking vision transformer and masked autoencoder in multimodal face anti-spoofing. International Journal of Computer Vision, 132(11), 5217\u20135238.","journal-title":"International Journal of Computer Vision"},{"key":"2673_CR70","doi-asserted-by":"crossref","unstructured":"Zhao, H., Zhou, W., Chen, D., Wei, T., Zhang, W., & Yu, N. (2021). Multi-attentional deepfake detection. In CVPR, pp. 2185\u20132194.","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"2673_CR71","doi-asserted-by":"crossref","unstructured":"Zhou, Q., Zhang, K. -Y., Yao, T., Lu, X., Yi, R., Ding, S., & Ma, L. (2023). Instance-aware domain generalization for face anti-spoofing. In CVPR, pp. 20453\u201320463.","DOI":"10.1109\/CVPR52729.2023.01959"},{"key":"2673_CR72","doi-asserted-by":"crossref","unstructured":"Zi, B., Chang, M., Chen, J., Ma, X., & Jiang, Y. -G. (2020). Wilddeepfake: A challenging real-world dataset for deepfake detection. In ACM MM, pp. 2382\u20132390.","DOI":"10.1145\/3394171.3413769"},{"key":"2673_CR73","doi-asserted-by":"crossref","unstructured":"Zou, J., Duan, Y., Li, B., Zhang, W., Pan, Y., & Pan, Z. (2022). Making adversarial examples more transferable and indistinguishable. In AAAI, vol. 36, pp. 3662\u20133670.","DOI":"10.1609\/aaai.v36i3.20279"}],"container-title":["International Journal of Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-025-02673-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11263-025-02673-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-025-02673-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T08:37:36Z","timestamp":1774600656000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11263-025-02673-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,29]]},"references-count":73,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["2673"],"URL":"https:\/\/doi.org\/10.1007\/s11263-025-02673-3","relation":{},"ISSN":["0920-5691","1573-1405"],"issn-type":[{"value":"0920-5691","type":"print"},{"value":"1573-1405","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,29]]},"assertion":[{"value":"11 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"This article complies with the Ethical Responsibilities of Authors, and the aspect of consent to participate is not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Our article is based on the previous work, which is mentioned in the article, and our work has obtained the permission of the previous authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"Not applicable","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Materials availability"}},{"value":"Not applicable","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}],"article-number":"88"}}