{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T11:28:53Z","timestamp":1762514933391,"version":"build-2065373602"},"reference-count":100,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T00:00:00Z","timestamp":1754438400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T00:00:00Z","timestamp":1754438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s13042-025-02773-z","type":"journal-article","created":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T04:01:45Z","timestamp":1754452905000},"page":"9627-9647","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Novel face anti-spoofing by integration of data augmentation, selective feature learning, and LaSupCon loss"],"prefix":"10.1007","volume":"16","author":[{"given":"Bao","family":"Bui-Quoc","sequence":"first","affiliation":[]},{"given":"Khanh","family":"Nguyen-Gia","sequence":"additional","affiliation":[]},{"given":"Hoai Nam","family":"Vu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,6]]},"reference":[{"key":"2773_CR1","doi-asserted-by":"publisher","first-page":"7381","DOI":"10.24297\/ijct.v18i0.7924","volume":"18","author":"I Chawla","year":"2018","unstructured":"Chawla I (2018) Face detection & recognition using tensor flow: A review. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 18:7381\u20137388. https:\/\/doi.org\/10.24297\/ijct.v18i0.7924","journal-title":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY"},{"key":"2773_CR2","doi-asserted-by":"publisher","first-page":"237","DOI":"10.3844\/jmrsp.2019.237.257","volume":"3","author":"R Petrescu","year":"2019","unstructured":"Petrescu R (2019) Face recognition as a biometric application. Journal of Mechatronics and Robotics 3:237\u2013257. https:\/\/doi.org\/10.3844\/jmrsp.2019.237.257","journal-title":"Journal of Mechatronics and Robotics"},{"issue":"7","key":"2773_CR3","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.1109\/TIFS.2014.2322255","volume":"9","author":"N Erdogmus","year":"2014","unstructured":"Erdogmus N, Marcel S (2014) Spoofing face recognition with 3d masks. IEEE Trans Inf Forensics Secur 9(7):1084\u20131097. https:\/\/doi.org\/10.1109\/TIFS.2014.2322255","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"10","key":"2773_CR4","doi-asserted-by":"publisher","first-page":"2268","DOI":"10.1109\/TIFS.2016.2578288","volume":"11","author":"K Patel","year":"2016","unstructured":"Patel K, Han H, Jain AK (2016) Secure face unlock: Spoof detection on smartphones. IEEE Trans Inf Forensics Secur 11(10):2268\u20132283. https:\/\/doi.org\/10.1109\/TIFS.2016.2578288","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"2773_CR5","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"D Wen","year":"2015","unstructured":"Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746\u2013761. https:\/\/doi.org\/10.1109\/TIFS.2015.2400395","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2773_CR6","doi-asserted-by":"publisher","unstructured":"Brockschmidt J, Shang J, Wu, J (2019) On the generality of facial forgery detection. In: 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW), pp. 43\u201347 . https:\/\/doi.org\/10.1109\/MASSW.2019.00015","DOI":"10.1109\/MASSW.2019.00015"},{"key":"2773_CR7","doi-asserted-by":"publisher","unstructured":"Kamat C (2024) Face anti-spoofing methods: A comparative analysis through the lens of a comprehensive review. International Journal for Research in Applied Science and Engineering Technology https:\/\/doi.org\/10.22214\/ijraset.2024.58383","DOI":"10.22214\/ijraset.2024.58383"},{"issue":"5","key":"2773_CR8","first-page":"5609","volume":"45","author":"Z Yu","year":"2022","unstructured":"Yu Z, Qin Y, Li X, Zhao C, Lei Z, Zhao G (2022) Deep learning for face anti-spoofing: A survey. IEEE Trans Pattern Anal Mach Intell 45(5):5609\u20135631","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"2773_CR9","doi-asserted-by":"crossref","unstructured":"Kong C, Wang S, Li H (2022) Digital and physical face attacks: Reviewing and one step further. arXiv: abs\/2209.14692","DOI":"10.1561\/116.00000069"},{"key":"2773_CR10","doi-asserted-by":"publisher","unstructured":"Zhou D, Zhang Y, Zhang J (2023) Exploring hybrid pooling of pretrained residual network for face anti-spoofing. Proceedings of the 15th International Conference on Digital Image Processing https:\/\/doi.org\/10.1145\/3604078.3604140","DOI":"10.1145\/3604078.3604140"},{"key":"2773_CR11","doi-asserted-by":"publisher","unstructured":"Solomon E, Cios KJ (2023) Hdlhc: Hybrid face anti-spoofing method concatenating deep learning and hand-crafted features. 2023 IEEE 6th International Conference on Electronic Information and Communication Technology (ICEICT), 470\u2013474 https:\/\/doi.org\/10.1109\/ICEICT57916.2023.10245462","DOI":"10.1109\/ICEICT57916.2023.10245462"},{"key":"2773_CR12","doi-asserted-by":"publisher","unstructured":"Wang H, Liu L, Jia A (2023) Face anti-spoofing method based on deep supervision. Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning https:\/\/doi.org\/10.1145\/3590003.3590023","DOI":"10.1145\/3590003.3590023"},{"key":"2773_CR13","doi-asserted-by":"publisher","first-page":"013007","DOI":"10.1117\/1.JEI.31.1.013007","volume":"31","author":"S Chen","year":"2022","unstructured":"Chen S, Song X, Feng Z, Xu T, Wu X, Kittler J (2022) Face anti-spoofing with local difference network and binary facial mask supervision. J Electron Imaging 31:013007\u2013013007. https:\/\/doi.org\/10.1117\/1.JEI.31.1.013007","journal-title":"J Electron Imaging"},{"key":"2773_CR14","doi-asserted-by":"publisher","unstructured":"Muhammad U, Hoque MZ, Oussalah M, Laaksonen JT (2023) Deep ensemble learning with frame skipping for face anti-spoofing. 2023 Twelfth International Conference on Image Processing Theory, Tools and Applications (IPTA), 1\u20136 https:\/\/doi.org\/10.1109\/IPTA59101.2023.10320013","DOI":"10.1109\/IPTA59101.2023.10320013"},{"key":"2773_CR15","doi-asserted-by":"publisher","first-page":"4775","DOI":"10.1109\/TIFS.2023.3296330","volume":"18","author":"A Liu","year":"2023","unstructured":"Liu A, Tan Z, Yu Z, Zhao C, Wan J, Liang Y, Lei Z, Zhang D, Li SZ, Guo G (2023) Fm-vit: Flexible modal vision transformers for face anti-spoofing. IEEE Trans Inf Forensics Secur 18:4775\u20134786. https:\/\/doi.org\/10.1109\/TIFS.2023.3296330","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2773_CR16","doi-asserted-by":"publisher","first-page":"8385","DOI":"10.1109\/TIFS.2024.3420699","volume":"19","author":"R Cai","year":"2023","unstructured":"Cai R, Yu Z, Kong C, Li H, Chen C, Hu Y, Kot AC (2023) S-adapter: Generalizing vision transformer for face anti-spoofing with statistical tokens. IEEE Trans Inf Forensics Secur 19:8385\u20138397","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2773_CR17","doi-asserted-by":"publisher","unstructured":"Lin X, Wang S, Cai R, Liu Y, Fu Y, Tang W, Yu Z, Kot A (2024) Suppress and rebalance: Towards generalized multi-modal face anti-spoofing. In: 2024 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 211\u2013221. https:\/\/doi.org\/10.1109\/CVPR52733.2024.00028","DOI":"10.1109\/CVPR52733.2024.00028"},{"key":"2773_CR18","doi-asserted-by":"crossref","unstructured":"Zhou Q, Zhang K-Y, Yao T, Yi R, Sheng K, Ding S, Ma L (2022) Generative domain adaptation for face anti-spoofing. In: European Conference on Computer Vision, pp. 335\u2013356. Springer","DOI":"10.1007\/978-3-031-20065-6_20"},{"key":"2773_CR19","doi-asserted-by":"publisher","first-page":"5430","DOI":"10.1109\/TPAMI.2024.3370721","volume":"46","author":"Y Liu","year":"2024","unstructured":"Liu Y, Chen Y, Dai W, Gou M, Huang C-T, Xiong H (2024) Source-free domain adaptation with domain generalized pretraining for face anti-spoofing. IEEE Trans Pattern Anal Mach Intell 46:5430\u20135448. https:\/\/doi.org\/10.1109\/TPAMI.2024.3370721","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"2773_CR20","doi-asserted-by":"publisher","unstructured":"Zhou Q, Zhang K-Y, Yao T, Lu, X, Ding S, Ma L (2024) Test-time domain generalization for face anti-spoofing. 2024 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 175\u2013187 https:\/\/doi.org\/10.1109\/CVPR52733.2024.00025","DOI":"10.1109\/CVPR52733.2024.00025"},{"key":"2773_CR21","doi-asserted-by":"publisher","first-page":"3238","DOI":"10.1109\/TIFS.2022.3202115","volume":"17","author":"C Kong","year":"2022","unstructured":"Kong C, Zheng K, Wang S, Rocha A, Li H (2022) Beyond the pixel world: A novel acoustic-based face anti-spoofing system for smartphones. IEEE Trans Inf Forensics Secur 17:3238\u20133253. https:\/\/doi.org\/10.1109\/TIFS.2022.3202115","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2773_CR22","doi-asserted-by":"crossref","unstructured":"Kong C, Zheng K, Liu Y, Wang S, Rocha A, Li H (2024) M3fas: An accurate and robust multimodal mobile face anti-spoofing system. IEEE Transactions on Dependable and Secure Computing","DOI":"10.1109\/TDSC.2024.3381598"},{"key":"2773_CR23","doi-asserted-by":"publisher","unstructured":"Anthony P, Ay B, Aydin G (2021) A review of face anti-spoofing methods for face recognition systems. In: 2021 International Conference on INnovations in Intelligent SysTems and Applications (INISTA), pp. 1\u20139 . https:\/\/doi.org\/10.1109\/INISTA52262.2021.9548404","DOI":"10.1109\/INISTA52262.2021.9548404"},{"key":"2773_CR24","doi-asserted-by":"publisher","unstructured":"Nikisins O, Mohammadi A, Anjos A, Marcel S (2018) On effectiveness of anomaly detection approaches against unseen presentation attacks in face anti-spoofing. In: 2018 International Conference on Biometrics (ICB), pp. 75\u201381. https:\/\/doi.org\/10.1109\/ICB2018.2018.00022","DOI":"10.1109\/ICB2018.2018.00022"},{"key":"2773_CR25","doi-asserted-by":"publisher","unstructured":"Yang X, Luo W, Bao L, Gao Y, Gong D, Zheng S, Li Z, Liu W (2019) Face anti-spoofing: Model matters, so does data. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3502\u20133511. https:\/\/doi.org\/10.1109\/CVPR.2019.00362","DOI":"10.1109\/CVPR.2019.00362"},{"key":"2773_CR26","doi-asserted-by":"publisher","unstructured":"Guo J, Zhu X, Xiao J, Lei Z, Wan G, Li SZ (2019) Improving face anti-spoofing by 3d virtual synthesis. In: 2019 International Conference on Biometrics (ICB), pp. 1\u20138. https:\/\/doi.org\/10.1109\/ICB45273.2019.8987415","DOI":"10.1109\/ICB45273.2019.8987415"},{"key":"2773_CR27","doi-asserted-by":"crossref","unstructured":"Zhang Y, Yin Z, Li Y, Yin G, Yan J, Shao J, Liu Z (2020) Celeba-spoof: Large-scale face anti-spoofing dataset with rich annotations. In: Computer Vision \u2013 ECCV 2020, pp. 70\u201385. Springer, Cham","DOI":"10.1007\/978-3-030-58610-2_5"},{"key":"2773_CR28","doi-asserted-by":"crossref","unstructured":"Yeo T, Kar OF, Zamir A (2021) Robustness via cross-domain ensembles. 2021 IEEE\/CVF International Conference on Computer Vision (ICCV), 12169\u201312179","DOI":"10.1109\/ICCV48922.2021.01197"},{"key":"2773_CR29","doi-asserted-by":"publisher","unstructured":"Wang Z, Wang Z, Yu Z, Deng W, Li J, Gao T, Wang Z (2022) Domain generalization via shuffled style assembly for face anti-spoofing. In: 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4113\u20134123. https:\/\/doi.org\/10.1109\/CVPR52688.2022.00409","DOI":"10.1109\/CVPR52688.2022.00409"},{"key":"2773_CR30","doi-asserted-by":"publisher","unstructured":"Zhou Q, Zhang K, Yao T, Lu X, Yi R, Ding S, Ma L (2023) Instance-aware domain generalization for face anti-spoofing. In: 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 20453\u201320463. IEEE Computer Society, Los Alamitos, CA, USA. https:\/\/doi.org\/10.1109\/CVPR52729.2023.01959","DOI":"10.1109\/CVPR52729.2023.01959"},{"key":"2773_CR31","doi-asserted-by":"publisher","unstructured":"Sun Y, Liu Y, Liu X, Li Y, Chu W (2023) Rethinking domain generalization for face anti-spoofing: Separability and alignment. In: 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 24563\u201324574. IEEE Computer Society, Los Alamitos, CA, USA. https:\/\/doi.org\/10.1109\/CVPR52729.2023.02353","DOI":"10.1109\/CVPR52729.2023.02353"},{"key":"2773_CR32","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.patrec.2021.10.014","volume":"155","author":"M Liu","year":"2022","unstructured":"Liu M, Mu J, Yu Z, Ruan K, Shu B, Yang J (2022) Adversarial learning and decomposition-based domain generalization for face anti-spoofing. Pattern Recogn Lett 155:171\u2013177. https:\/\/doi.org\/10.1016\/j.patrec.2021.10.014","journal-title":"Pattern Recogn Lett"},{"issue":"10","key":"2773_CR33","doi-asserted-by":"publisher","first-page":"2639","DOI":"10.1109\/TIFS.2018.2825949","volume":"13","author":"H Li","year":"2018","unstructured":"Li H, He P, Wang S, Rocha A, Jiang X, Kot AC (2018) Learning generalized deep feature representation for face anti-spoofing. IEEE Trans Inf Forensics Secur 13(10):2639\u20132652. https:\/\/doi.org\/10.1109\/TIFS.2018.2825949","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2773_CR34","doi-asserted-by":"crossref","unstructured":"Orfao J, Haar D (2023) Keyframe and gan-based data augmentation for face anti-spoofing. In: International Conference on Pattern Recognition Applications and Methods. https:\/\/api.semanticscholar.org\/CorpusID:257358416","DOI":"10.5220\/0011648400003411"},{"key":"2773_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2023.103779","volume":"235","author":"J Chen","year":"2023","unstructured":"Chen J, Yang X, Yin H, Ma M, Chen B, Peng J, Guo Y, Yin Z, Su H (2023) Advfas: A robust face anti-spoofing framework against adversarial examples. Comput Vis Image Underst 235:103779. https:\/\/doi.org\/10.1016\/j.cviu.2023.103779","journal-title":"Comput Vis Image Underst"},{"key":"2773_CR36","doi-asserted-by":"publisher","unstructured":"Wang Y-C, Wang C-Y, Lai S-H (2022) Disentangled representation with dual-stage feature learning for face anti-spoofing. In: 2022 IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV), pp. 1234\u20131243. https:\/\/doi.org\/10.1109\/WACV51458.2022.00130","DOI":"10.1109\/WACV51458.2022.00130"},{"key":"2773_CR37","doi-asserted-by":"publisher","unstructured":"Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) Oulu-npu: A mobile face presentation attack database with real-world variations. In: 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017), pp. 612\u2013618. https:\/\/doi.org\/10.1109\/FG.2017.77","DOI":"10.1109\/FG.2017.77"},{"key":"2773_CR38","doi-asserted-by":"publisher","unstructured":"Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ (2012) A face antispoofing database with diverse attacks. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 26\u201331. https:\/\/doi.org\/10.1109\/ICB.2012.6199754","DOI":"10.1109\/ICB.2012.6199754"},{"key":"2773_CR39","unstructured":"Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG), pp. 1\u20137"},{"key":"2773_CR40","doi-asserted-by":"crossref","unstructured":"Li X, Komulainen J, Zhao G, Yuen P-C, Pietik\u00e4inen M (2016) Generalized face anti-spoofing by detecting pulse from face videos. In: 2016 23rd International Conference on Pattern Recognition (ICPR), pp. 4244\u20134249. IEEE","DOI":"10.1109\/ICPR.2016.7900300"},{"key":"2773_CR41","doi-asserted-by":"crossref","unstructured":"Komulainen J, Hadid A, Pietik\u00e4inen M (2013) Context based face anti-spoofing. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1\u20138 . IEEE","DOI":"10.1109\/BTAS.2013.6712690"},{"issue":"10","key":"2773_CR42","doi-asserted-by":"publisher","first-page":"2268","DOI":"10.1109\/TIFS.2016.2578288","volume":"11","author":"K Patel","year":"2016","unstructured":"Patel K, Han H, Jain AK (2016) Secure face unlock: Spoof detection on smartphones. IEEE Trans Inf Forensics Secur 11(10):2268\u20132283","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2773_CR43","doi-asserted-by":"crossref","unstructured":"Ali A, Deravi F, Hoque S (2012) Liveness detection using gaze collinearity. In: 2012 Third International Conference on Emerging Security Technologies, pp. 62\u201365. IEEE","DOI":"10.1109\/EST.2012.12"},{"key":"2773_CR44","doi-asserted-by":"crossref","unstructured":"Liu Y, Jourabloo A, Liu X (2018) Learning deep models for face anti-spoofing: Binary or auxiliary supervision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 389\u2013398","DOI":"10.1109\/CVPR.2018.00048"},{"key":"2773_CR45","doi-asserted-by":"crossref","unstructured":"Lin B, Li X, Yu Z, Zhao G (2019) Face liveness detection by rppg features and contextual patch-based cnn. In: Proceedings of the 2019 3rd International Conference on Biometric Engineering and Applications, pp. 61\u201368","DOI":"10.1145\/3345336.3345345"},{"key":"2773_CR46","doi-asserted-by":"crossref","unstructured":"Yu Z, Peng W, Li X, Hong X, Zhao G (2019) Remote heart rate measurement from highly compressed facial videos: an end-to-end deep learning solution with video enhancement. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 151\u2013160","DOI":"10.1109\/ICCV.2019.00024"},{"key":"2773_CR47","doi-asserted-by":"crossref","unstructured":"Boulkenafet Z, Komulainen J, Hadid A (2015) Face anti-spoofing based on color texture analysis. In: 2015 IEEE International Conference on Image Processing (ICIP), pp. 2636\u20132640. IEEE","DOI":"10.1109\/ICIP.2015.7351280"},{"issue":"2","key":"2773_CR48","first-page":"141","volume":"24","author":"Z Boulkenafet","year":"2016","unstructured":"Boulkenafet Z, Komulainen J, Hadid A (2016) Face antispoofing using speeded-up robust features and fisher vector encoding. IEEE Signal Process Lett 24(2):141\u2013145","journal-title":"IEEE Signal Process Lett"},{"key":"2773_CR49","doi-asserted-by":"crossref","unstructured":"Tan X, Li Y, Liu J, Jiang L (2010) Face liveness detection from a single image with sparse low rank bilinear discriminative model. In: Computer Vision\u2013ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part VI 11, pp. 504\u2013517. Springer","DOI":"10.1007\/978-3-642-15567-3_37"},{"issue":"10","key":"2773_CR50","doi-asserted-by":"publisher","first-page":"4031","DOI":"10.1109\/TCSVT.2020.3044986","volume":"31","author":"S Jia","year":"2020","unstructured":"Jia S, Li X, Hu C, Guo G, Xu Z (2020) 3d face anti-spoofing with factorized bilinear coding. IEEE Trans Circuits Syst Video Technol 31(10):4031\u20134045","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"2773_CR51","doi-asserted-by":"crossref","unstructured":"Ganjoo R, Purohit A (2021) Anti-spoofing door lock using face recognition and blink detection. In: 2021 6th International Conference on Inventive Computation Technologies (ICICT), pp. 1090\u20131096. IEEE","DOI":"10.1109\/ICICT50816.2021.9358795"},{"key":"2773_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2022.101685","volume":"86","author":"D Tran-Anh","year":"2022","unstructured":"Tran-Anh D, Vu NH, Nguyen-Trong K, Pham C (2022) Multi-task learning neural networks for breath sound detection and classification in pervasive healthcare. Pervasive Mob Comput 86:101685","journal-title":"Pervasive Mob Comput"},{"key":"2773_CR53","doi-asserted-by":"crossref","unstructured":"Hoai NV, Dung NM, Ro S (2019) Sinkhole detection by deep learning and data association. In: 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN), pp. 211\u2013213. IEEE","DOI":"10.1109\/ICUFN.2019.8806136"},{"key":"2773_CR54","unstructured":"Yang J, Lei Z, Li SZ (2014) Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601"},{"key":"2773_CR55","doi-asserted-by":"crossref","unstructured":"Muhammad U, Hadid A (2019) Face anti-spoofing using hybrid residual learning framework. In: 2019 International Conference on Biometrics (ICB), pp. 1\u20137. IEEE","DOI":"10.1109\/ICB45273.2019.8987283"},{"issue":"5","key":"2773_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3402446","volume":"11","author":"X Tu","year":"2020","unstructured":"Tu X, Ma Z, Zhao J, Du G, Xie M, Feng J (2020) Learning generalizable and identity-discriminative representations for face anti-spoofing. ACM Transactions on Intelligent Systems and Technology (TIST) 11(5):1\u201319","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"key":"2773_CR57","doi-asserted-by":"crossref","unstructured":"Li L, Feng X, Boulkenafet Z, Xia Z, Li M, Hadid A (2016) An original face anti-spoofing approach using partial convolutional neural network. In: 2016 Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA), pp. 1\u20136. IEEE","DOI":"10.1109\/IPTA.2016.7821013"},{"key":"2773_CR58","doi-asserted-by":"crossref","unstructured":"Larbi K, Ouarda W, Drira H, Amor BB, Amar CB (2018) Deepcolorfasd: face anti spoofing solution using a multi channeled color spaces cnn. In: 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 4011\u20134016. IEEE","DOI":"10.1109\/SMC.2018.00680"},{"key":"2773_CR59","doi-asserted-by":"crossref","unstructured":"George A, Marcel S (2019) Deep pixel-wise binary supervision for face presentation attack detection. In: 2019 International Conference on Biometrics (ICB), pp. 1\u20138. IEEE","DOI":"10.1109\/ICB45273.2019.8987370"},{"key":"2773_CR60","doi-asserted-by":"publisher","first-page":"3181","DOI":"10.1109\/TIFS.2020.2985530","volume":"15","author":"W Sun","year":"2020","unstructured":"Sun W, Song Y, Chen C, Huang J, Kot AC (2020) Face spoofing detection based on local ternary label supervision in fully convolutional networks. IEEE Trans Inf Forensics Secur 15:3181\u20133196","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2773_CR61","doi-asserted-by":"crossref","unstructured":"Peng D, Xiao J, Zhu R, Gao G (2020) Ts-fen: Probing feature selection strategy for face anti-spoofing. In: ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2942\u20132946. IEEE","DOI":"10.1109\/ICASSP40776.2020.9054115"},{"key":"2773_CR62","doi-asserted-by":"crossref","unstructured":"Liu S, Yuen PC, Zhang S, Zhao G (2016) 3d mask face anti-spoofing with remote photoplethysmography. In: Computer Vision\u2013ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11\u201314, 2016, Proceedings, Part VII 14, pp. 85\u2013100. Springer","DOI":"10.1007\/978-3-319-46478-7_6"},{"key":"2773_CR63","doi-asserted-by":"crossref","unstructured":"Yao C, Ren J, Bai R, Du H, Liu J, Jiang X (2023) Mask attack detection using vascular-weighted motion-robust rppg signals. IEEE Transactions on Information Forensics and Security","DOI":"10.1109\/TIFS.2023.3293949"},{"key":"2773_CR64","doi-asserted-by":"crossref","unstructured":"Yang X, Luo W, Bao L, Gao Y, Gong D, Zheng S, Li Z, Liu W (2023) Face anti-spoofing: Model matters, so does data. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3507\u20133516 (2019)","DOI":"10.1109\/CVPR.2019.00362"},{"key":"2773_CR65","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.patrec.2020.01.002","volume":"131","author":"Y Ma","year":"2020","unstructured":"Ma Y, Wu L, Li Z et al (2020) A novel face presentation attack detection scheme based on multi-regional convolutional neural networks. Pattern Recogn Lett 131:261\u2013267","journal-title":"Pattern Recogn Lett"},{"issue":"3","key":"2773_CR66","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1109\/TBIOM.2022.3184500","volume":"4","author":"Z Wang","year":"2022","unstructured":"Wang Z, Wang Q, Deng W, Guo G (2022) Face anti-spoofing using transformers with relation-aware mechanism. IEEE Transactions on Biometrics Behavior and Identity Science 4(3):439\u2013450","journal-title":"IEEE Transactions on Biometrics Behavior and Identity Science"},{"key":"2773_CR67","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.patrec.2023.04.011","volume":"171","author":"S Chen","year":"2023","unstructured":"Chen S, Wu G, Yang Y, Guo Z (2023) A simple and effective patch-based method for frame-level face anti-spoofing. Pattern Recogn Lett 171:1\u20137","journal-title":"Pattern Recogn Lett"},{"key":"2773_CR68","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2023.103886","volume":"95","author":"S Zhu","year":"2023","unstructured":"Zhu S, Xiang S (2023) Multiscale residual gradient attention for face anti-spoofing. J Vis Commun Image Represent 95:103886","journal-title":"J Vis Commun Image Represent"},{"key":"2773_CR69","doi-asserted-by":"crossref","unstructured":"Yu Z, Zhao C, Wang Z, Qin Y, Su Z, Li X, Zhou F, Zhao G (2020) Searching central difference convolutional networks for face anti-spoofing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5295\u20135305","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"2773_CR70","doi-asserted-by":"crossref","unstructured":"He S, Dong E, Tong J, Yang S, Liang X, Li W (2023) A single-frame face anti-spoofing algorithm with circular cdc and multi-scale spatial attention. In: 2023 IEEE International Conference on Mechatronics and Automation (ICMA), pp. 319\u2013323. IEEE","DOI":"10.1109\/ICMA57826.2023.10215674"},{"key":"2773_CR71","doi-asserted-by":"publisher","first-page":"2890","DOI":"10.1109\/TIFS.2022.3197054","volume":"17","author":"C Chen","year":"2022","unstructured":"Chen C, Zhang S, Lan F, Huang J (2022) Domain-agnostic document authentication against practical recapturing attacks. IEEE Trans Inf Forensics Secur 17:2890\u20132905","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2773_CR72","doi-asserted-by":"publisher","first-page":"2477","DOI":"10.1109\/TIFS.2021.3055018","volume":"16","author":"B Chen","year":"2021","unstructured":"Chen B, Yang W, Li H, Wang S, Kwong S (2021) Camera invariant feature learning for generalized face anti-spoofing. IEEE Trans Inf Forensics Secur 16:2477\u20132492","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2773_CR73","doi-asserted-by":"crossref","unstructured":"Liu D, Dang Z, Peng C, Zheng Y, Li S, Wang N, Gao X (2023) Fedforgery: generalized face forgery detection with residual federated learning. IEEE Transactions on Information Forensics and Security","DOI":"10.1109\/TIFS.2023.3293951"},{"key":"2773_CR74","doi-asserted-by":"crossref","unstructured":"Liu D, Zheng Z, Peng C, Wang Y, Wang N, Gao X (2023) Hierarchical forgery classifier on multi-modality face forgery clues. IEEE Transactions on Multimedia","DOI":"10.1109\/TMM.2023.3304913"},{"key":"2773_CR75","doi-asserted-by":"crossref","unstructured":"Guo J, Zhu X, Xiao J, Lei Z, Wan G, Li SZ (2019) Improving face anti-spoofing by 3d virtual synthesis. In: 2019 International Conference on Biometrics (ICB), pp. 1\u20138. IEEE","DOI":"10.1109\/ICB45273.2019.8987415"},{"key":"2773_CR76","doi-asserted-by":"crossref","unstructured":"Shao R, Lan X, Li J, Yuen PC (2019) Multi-adversarial discriminative deep domain generalization for face presentation attack detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10023\u201310031","DOI":"10.1109\/CVPR.2019.01026"},{"key":"2773_CR77","doi-asserted-by":"crossref","unstructured":"Li H, Pan SJ, Wang S, Kot AC (2018) Domain generalization with adversarial feature learning. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 5400\u20135409","DOI":"10.1109\/CVPR.2018.00566"},{"key":"2773_CR78","doi-asserted-by":"crossref","unstructured":"Wang J, Zhang J, Bian Y, Cai Y, Wang C, Pu S (2021) Self-domain adaptation for face anti-spoofing. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, pp. 2746\u20132754","DOI":"10.1609\/aaai.v35i4.16379"},{"key":"2773_CR79","doi-asserted-by":"crossref","unstructured":"Atoum Y, Liu Y, Jourabloo A, Liu X (2017) Face anti-spoofing using patch and depth-based cnns. In: 2017 IEEE International Joint Conference on Biometrics (IJCB), pp. 319\u2013328. IEEE","DOI":"10.1109\/BTAS.2017.8272713"},{"key":"2773_CR80","doi-asserted-by":"crossref","unstructured":"Yu Z, Li X, Niu X, Shi J, Zhao G (2020) Face anti-spoofing with human material perception. In: Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part VII 16, pp. 557\u2013575 . Springer","DOI":"10.1007\/978-3-030-58571-6_33"},{"key":"2773_CR81","doi-asserted-by":"crossref","unstructured":"Kim T, Kim Y, Kim I, Kim D (2019) Basn: Enriching feature representation using bipartite auxiliary supervisions for face anti-spoofing. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision Workshops, pp. 0\u20130","DOI":"10.1109\/ICCVW.2019.00062"},{"key":"2773_CR82","doi-asserted-by":"crossref","unstructured":"Wang Z, Yu Z, Zhao C, Zhu X, Qin Y, Zhou Q, Zhou F, Lei Z (2020) Deep spatial gradient and temporal depth learning for face anti-spoofing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5042\u20135051","DOI":"10.1109\/CVPR42600.2020.00509"},{"key":"2773_CR83","doi-asserted-by":"crossref","unstructured":"Liu Y, Stehouwer J, Jourabloo A, Liu X (2019) Deep tree learning for zero-shot face anti-spoofing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4680\u20134689","DOI":"10.1109\/CVPR.2019.00481"},{"key":"2773_CR84","doi-asserted-by":"crossref","unstructured":"Hossain MS, Rupty L, Roy K, Hasan M, Sengupta S, Mohammed N (2020) A-deeppixbis: Attentional angular margin for face anti-spoofing. In: 2020 Digital Image Computing: Techniques and Applications (DICTA), pp. 1\u20138. IEEE","DOI":"10.1109\/DICTA51227.2020.9363382"},{"key":"2773_CR85","doi-asserted-by":"crossref","unstructured":"Yu Z, Qin Y, Xu X, Zhao C, Wang Z, Lei Z, Zhao G (2020) Auto-fas: Searching lightweight networks for face anti-spoofing. In: ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 996\u20131000. IEEE","DOI":"10.1109\/ICASSP40776.2020.9053587"},{"key":"2773_CR86","doi-asserted-by":"crossref","unstructured":"Liu Y, Stehouwer J, Liu X (2020) On disentangling spoof trace for generic face anti-spoofing. In: Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part XVIII 16, pp. 406\u2013422 . Springer","DOI":"10.1007\/978-3-030-58523-5_24"},{"key":"2773_CR87","doi-asserted-by":"crossref","unstructured":"Zhang Y, Yin Z, Li Y, Yin G, Yan J, Shao J, Liu Z (2020) Celeba-spoof: Large-scale face anti-spoofing dataset with rich annotations. In: Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part XII 16, pp. 70\u201385. Springer","DOI":"10.1007\/978-3-030-58610-2_5"},{"issue":"10","key":"2773_CR88","doi-asserted-by":"publisher","first-page":"2268","DOI":"10.1109\/TIFS.2016.2578288","volume":"11","author":"K Patel","year":"2016","unstructured":"Patel K, Han H, Jain AK (2016) Secure face unlock: Spoof detection on smartphones. IEEE Trans Inf Forensics Secur 11(10):2268\u20132283. https:\/\/doi.org\/10.1109\/TIFS.2016.2578288","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2773_CR89","doi-asserted-by":"publisher","unstructured":"Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) Oulu-npu: A mobile face presentation attack database with real-world variations. In: 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017), pp. 612\u2013618. https:\/\/doi.org\/10.1109\/FG.2017.77","DOI":"10.1109\/FG.2017.77"},{"key":"2773_CR90","doi-asserted-by":"publisher","unstructured":"Liu Y, Jourabloo A, Liu X (2018) Learning deep models for face anti-spoofing: Binary or auxiliary supervision. In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 389\u2013398. https:\/\/doi.org\/10.1109\/CVPR.2018.00048","DOI":"10.1109\/CVPR.2018.00048"},{"key":"2773_CR91","doi-asserted-by":"crossref","unstructured":"Yun S, Han D, Oh SJ, Chun S, Choe J, Yoo Y (2019) Cutmix: Regularization strategy to train strong classifiers with localizable features. In: International Conference on Computer Vision (ICCV)","DOI":"10.1109\/ICCV.2019.00612"},{"key":"2773_CR92","doi-asserted-by":"publisher","unstructured":"Hong M, Choi J, Kim G (2021) Stylemix: Separating content and style for enhanced data augmentation. In: 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 14857\u201314865 . https:\/\/doi.org\/10.1109\/CVPR46437.2021.01462","DOI":"10.1109\/CVPR46437.2021.01462"},{"key":"2773_CR93","doi-asserted-by":"publisher","unstructured":"Wang J, Zhang J, Bian Y, Cai Y, Wang C, Pu S (2021) Self-domain adaptation for face anti-spoofing. Proceedings of the AAAI Conference on Artificial Intelligence 35. https:\/\/doi.org\/10.1609\/aaai.v35i4.16379","DOI":"10.1609\/aaai.v35i4.16379"},{"key":"2773_CR94","doi-asserted-by":"publisher","first-page":"1132","DOI":"10.1609\/aaai.v35i2.16199","volume":"35","author":"Z Chen","year":"2021","unstructured":"Chen Z, Yao T, Sheng K, Ding S, Tai Y, Li J, Huang F, Jin X (2021) Generalizable representation learning for mixture domain face anti-spoofing. Proceedings of the AAAI Conference on Artificial Intelligence 35:1132\u20131139. https:\/\/doi.org\/10.1609\/aaai.v35i2.16199","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"2773_CR95","doi-asserted-by":"publisher","unstructured":"Liu S, Zhang K-Y, Yao T, Sheng K, Ding S, Tai Y, Li J, Xie Y, Ma L (2021) Dual reweighting domain generalization for face presentation attack detection. In: Zhou, Z.-H. (ed.) Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, IJCAI-21, pp. 867\u2013873. International Joint Conferences on Artificial Intelligence Organization, ??? . https:\/\/doi.org\/10.24963\/ijcai.2021\/120 . Main Track","DOI":"10.24963\/ijcai.2021\/120"},{"key":"2773_CR96","doi-asserted-by":"publisher","first-page":"1782","DOI":"10.1609\/aaai.v36i2.20071","volume":"36","author":"S Liu","year":"2022","unstructured":"Liu S, Lu S, Xu H, Yang J, Ding S, Ma L (2022) Feature generation and hypothesis verification for reliable face anti-spoofing. Proceedings of the AAAI Conference on Artificial Intelligence 36:1782\u20131791. https:\/\/doi.org\/10.1609\/aaai.v36i2.20071","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"2773_CR97","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-031-19778-9_14","volume-title":"Computer Vision - ECCV 2022","author":"X Guo","year":"2022","unstructured":"Guo X, Liu Y, Jain A, Liu X (2022) Multi-domain learning for updating face anti-spoofing models. In: Avidan S, Brostow G, Ciss\u00e9 M, Farinella GM, Hassner T (eds) Computer Vision - ECCV 2022. Springer, Cham, pp 230\u2013249"},{"key":"2773_CR98","doi-asserted-by":"crossref","unstructured":"Zhang W, Liu H, Liu F, Ramachandra R, Busch C (2022) Effective presentation attack detection driven by face related task. In: European Conference on Computer Vision, pp. 408\u2013423. Springer","DOI":"10.1007\/978-3-031-20065-6_24"},{"key":"2773_CR99","doi-asserted-by":"publisher","unstructured":"Liao C-H, Chen W-C, Liu H-T, Yeh Y-R, Hu M-C, Chen C-S (2023) Domain invariant vision transformer learning for face anti-spoofing. In: 2023 IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV), pp. 6087\u20136096 . https:\/\/doi.org\/10.1109\/WACV56688.2023.00604","DOI":"10.1109\/WACV56688.2023.00604"},{"issue":"7","key":"2773_CR100","doi-asserted-by":"publisher","first-page":"1680","DOI":"10.1007\/s11263-023-01778-x","volume":"131","author":"F Jiang","year":"2023","unstructured":"Jiang F, Li Q, Liu P, Zhou X-D, Sun Z (2023) Adversarial learning domain-invariant conditional features for robust face anti-spoofing. Int J Comput Vision 131(7):1680\u20131703. https:\/\/doi.org\/10.1007\/s11263-023-01778-x","journal-title":"Int J Comput Vision"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02773-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-025-02773-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02773-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T11:24:06Z","timestamp":1762514646000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-025-02773-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,6]]},"references-count":100,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["2773"],"URL":"https:\/\/doi.org\/10.1007\/s13042-025-02773-z","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"type":"print","value":"1868-8071"},{"type":"electronic","value":"1868-808X"}],"subject":[],"published":{"date-parts":[[2025,8,6]]},"assertion":[{"value":"30 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}