{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:14:29Z","timestamp":1740100469910,"version":"3.37.3"},"reference-count":55,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100011038","name":"Office of the Director of National Intelligence (ODNI), Intelligence Advanced Research Projects Activity (IARPA), via IARPA R&D","doi-asserted-by":"publisher","award":["2017-17020200005"],"award-info":[{"award-number":["2017-17020200005"]}],"id":[{"id":"10.13039\/100011038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1109\/fg52635.2021.9667024","type":"proceedings-article","created":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T05:34:23Z","timestamp":1643175263000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["Explaining Face Presentation Attack Detection Using Natural Language"],"prefix":"10.1109","author":[{"given":"Hengameh","family":"Mirzaalian","sequence":"first","affiliation":[]},{"given":"Mohamed E.","family":"Hussein","sequence":"additional","affiliation":[]},{"given":"Leonidas","family":"Spinoulas","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"May","sequence":"additional","affiliation":[]},{"given":"Wael","family":"Abd-Almageed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Grad-cam Why did you say that?","year":"2016","author":"selvaraju","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578288"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1093\/ijl\/3.4.235"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00048"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00048"},{"key":"ref37","first-page":"14851","article-title":"Detection and continual learning of novel face presentation attacks","author":"rostami","year":"2021","journal-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV)"},{"journal-title":"&#x201C;Why Should I Trust You?&#x201D; Explaining the Predictions of Any Classifier","year":"2016","author":"ribeiro","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6866"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00201"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206594"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"ref29","first-page":"74","article-title":"ROUGE: A package for automatic evaluation of summaries","author":"lin","year":"2004","journal-title":"Text Summarization Branches Out"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272713"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.111"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_1"},{"journal-title":"Image captioning through image transformer","year":"2020","author":"he","key":"ref21"},{"journal-title":"Ropad Robust presentation attack detection through unsupervised adversarial invariance","year":"2019","author":"jaiswal","key":"ref24"},{"journal-title":"Squeeze-and-Excitation Networks","year":"2017","author":"hu","key":"ref23"},{"key":"ref26","article-title":"Adam: A method for stochastic optimization, 2014","author":"kingma","year":"2015","journal-title":"Comment Published as a conference paper at the 3rd International Conference for Learning Representations"},{"key":"ref25","first-page":"290","article-title":"Face de-spoofing: Anti-spoofing via noise modeling","author":"jourabloo","year":"2018","journal-title":"Proceedings of the European Conference on Computer Vision (ECCV)"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053587"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00534"},{"journal-title":"Learning deep features for discriminative localization","year":"2015","author":"zhou","key":"ref55"},{"journal-title":"Image super-resolution using very deep residual channel attention networks","year":"2018","author":"zhang","key":"ref54"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.321"},{"journal-title":"Visualizing and Understanding Convolutional Networks","year":"2013","author":"zeiler","key":"ref52"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37410-4_11"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref40","article-title":"Explainable artificial intelligence for face presentation attack detection","author":"silva","year":"2020","journal-title":"26th Portuguese Conference in Pattern Recognition (RECPAD)"},{"key":"ref12","first-page":"4171","article-title":"BERT: Pretraining of deep bidirectional transformers for language understanding","author":"devlin","year":"2019","journal-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics Human Language Technologies Volume 1 (Long and Short Papers)"},{"key":"ref13","article-title":"An image is worth 16&#x00D7;16 words: Transformers for image recognition at scale","author":"dosovitskiy","year":"2021","journal-title":"ICLRE"},{"key":"ref14","first-page":"162","article-title":"HyTER: Meaning-equivalent semantics for translation evaluation","author":"dreyer","year":"2012","journal-title":"Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics Human Language Technologies"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.371"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICMIP.2017.9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484333"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2404294"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s13218-020-00679-2"},{"key":"ref3","first-page":"65","article-title":"METEOR: An automatic metric for MT evaluation with improved correlation with human judgments","author":"banerjee","year":"2005","journal-title":"Proceedings of the ACL Workshop on Intrinsic and Extrinsic Evaluation Measures for Machine Translation and\/or Summarization"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2630740"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2015.7351280"},{"journal-title":"SCA-CNN Spatial and channel-wise attention in convolutional networks for image captioning","year":"2016","author":"chen","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW52041.2021.00015"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00362"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1017\/S1351324916000334"},{"journal-title":"Explainable face recognition","year":"2020","author":"williford","key":"ref46"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00509"},{"journal-title":"Learn convolutional neural network for face anti-spoofing","year":"2014","author":"yang","key":"ref48"},{"key":"ref47","first-page":"2048","article-title":"Show, attend and tell: Neural image caption generation with visual attention","author":"xu","year":"2015","journal-title":"Proceedings of the 32nd International Conference on Machine Learning volume 37 of Proceedings of Machine Learning Research"},{"journal-title":"Multispectral biometrics system framework Application to presentation attack detection","year":"2020","author":"spinoulas","key":"ref42"},{"journal-title":"Deep Inside Convolutional Networks Visualising Image Classification Models and Saliency Maps","year":"2014","author":"simonyan","key":"ref41"},{"journal-title":"Explainable artificial intelligence a systematic review","year":"2020","author":"vilone","key":"ref44"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.386"}],"event":{"name":"2021 16th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2021)","start":{"date-parts":[[2021,12,15]]},"location":"Jodhpur, India","end":{"date-parts":[[2021,12,18]]}},"container-title":["2021 16th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2021)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9666787\/9666788\/09667024.pdf?arnumber=9667024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:28Z","timestamp":1652201728000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9667024\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/fg52635.2021.9667024","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]}}}