{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T22:10:48Z","timestamp":1772143848841,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/btas.2018.8698550","type":"proceedings-article","created":{"date-parts":[[2019,4,26]],"date-time":"2019-04-26T03:48:37Z","timestamp":1556250517000},"page":"1-7","source":"Crossref","is-referenced-by-count":86,"title":["Spoofing Deep Face Recognition with Custom Silicone Masks"],"prefix":"10.1109","author":[{"given":"Sushil","family":"Bhattacharjee","sequence":"first","affiliation":[]},{"given":"Amir","family":"Mohammadi","sequence":"additional","affiliation":[]},{"given":"Sebastien","family":"Marcel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2676720"},{"key":"ref11","author":"marcel","year":"2014","journal-title":"Handbook of biometric antispoofing"},{"key":"ref12","article-title":"Deeply Vulnerable &#x2013; A Study of The Robustness of Face Recognition Methods to Presentation Attacks","author":"mohammadi","year":"2017","journal-title":"IET Biometrics"},{"key":"ref13","first-page":"41.1","article-title":"Deep Face Recognition","volume":"1","author":"parkhi","year":"2015","journal-title":"British Machine Vision Conference"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISBA.2017.7947698"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3038924"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.193"},{"key":"ref17","author":"sandberg","year":"2017","journal-title":"Face recognition using tensorflow"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/9682453"},{"key":"ref4","author":"atanasoaei","year":"2012","journal-title":"Multivariate boosting with look-up tables for face processing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2017.265090754"},{"key":"ref6","article-title":"Your Face Is Not Your Password Face Authentication Bypassing Lenovo&#x2013;asus&#x2013;toshiba","author":"duc","year":"2009","journal-title":"Black Hat Briefings"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/BIOSIG.2017.8053524"},{"key":"ref8","author":"huang","year":"2007","journal-title":"Labeled Faces in the Wild A Database for Studying Face Recognition in Unconstrained Environments"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712688"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.40"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791171"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.193"},{"key":"ref20","article-title":"Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning","author":"szegedy","year":"2016","journal-title":"arXiv preprint arXiv 0804 1602"},{"key":"ref22","first-page":"547","article-title":"Detector of Facial Landmarks Learned by the Structured Output SVM","volume":"1","author":"u?i?\u00e1?","year":"2012","journal-title":"Proc of the Int Conf on Computer Vision Theory and Applications (VISAPP)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"ref23","article-title":"A Light CNN for Deep Face Representation with Noisy Labels","author":"wu","year":"2015","journal-title":"arXiv preprint arXiv 1511 02683"}],"event":{"name":"2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS)","location":"Redondo Beach, CA, USA","start":{"date-parts":[[2018,10,22]]},"end":{"date-parts":[[2018,10,25]]}},"container-title":["2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8692576\/8698537\/08698550.pdf?arnumber=8698550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T23:09:17Z","timestamp":1557788957000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8698550\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/btas.2018.8698550","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}