{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T03:40:24Z","timestamp":1771645224965,"version":"3.50.1"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100011222","name":"lab of Center for Biometrics and Security Research, NLPR, CA- SIA","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011222","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,28]]},"DOI":"10.1109\/ijcb48548.2020.9304873","type":"proceedings-article","created":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T16:58:35Z","timestamp":1610038715000},"page":"1-8","source":"Crossref","is-referenced-by-count":36,"title":["3DPC-Net: 3D Point Cloud Network for Face Anti-spoofing"],"prefix":"10.1109","author":[{"given":"Xuan","family":"Li","sequence":"first","affiliation":[]},{"given":"Jun","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Ajian","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Guodong","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Stan Z.","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2778152"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199754"},{"key":"ref33","article-title":"Learn convolutional neural network for face anti-spoofing","author":"yang","year":"2014","journal-title":"CVPR"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00509"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1145\/3326362","article-title":"Dynamic graph cnn for learning on point clouds","volume":"38","author":"wang","year":"2019","journal-title":"ACM Transactions on Graphics"},{"key":"ref30","article-title":"Face liveness detection from a single image with sparse low rank bilinear discriminative model","author":"tan","year":"2010","journal-title":"ECCV"},{"key":"ref37","article-title":"Casia-surf: A large-scale multimodal benchmark for face anti-spoofing","author":"zhang","year":"2019","journal-title":"CVPR"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00362"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612955"},{"key":"ref10","article-title":"On the effectiveness of local binary patterns in face anti-spoofing","author":"chingovska","year":"2012","journal-title":"BIOSIG"},{"key":"ref11","article-title":"Video-based face spoofing detection through visual rhythm analysis","author":"da silva pinto","year":"2012","journal-title":"Sibgrapi"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612981"},{"key":"ref13","article-title":"Spoofing in 2d face recognition with 3d masks and anti-spoofing with kinect","author":"erdogmus","year":"2014","journal-title":"BTAS"},{"key":"ref14","article-title":"Joint 3d face reconstruction and dense alignment with position map regression network","author":"feng","year":"2018","journal-title":"ECCV"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICMIP.2017.9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987370"},{"key":"ref17","article-title":"Atlasnet: A papier-m&#x00E2;ch&#x00E9; approach to learning 3d surface generation","author":"groueix","year":"2018","journal-title":"CVPR"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987415"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01026"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272758"},{"key":"ref27","article-title":"Pointnct++: Deep hierarchical feature learning on point sets in a metric space","author":"qi","year":"2017","journal-title":"NIPS"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2013.23"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2555286"},{"key":"ref29","author":"sun","year":"2016","journal-title":"Deep learning face representation from predicting 10 000 classes"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2017.77"},{"key":"ref7","article-title":"Face anti-spoofing using speeded-up robust features and fisher vector encoding","author":"boulkenafet","year":"2017","journal-title":"SPL"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272713"},{"key":"ref1","year":"2016","journal-title":"information technology biometric presentation attack detection part 1 Framework international organization for standardization"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.16"},{"key":"ref20","article-title":"Face de-spoofing: Anti-spoofing via noise modeling","author":"jourabloo","year":"2018","journal-title":"CVPR"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IPTA.2016.7821013"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987247"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00048"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578288"},{"key":"ref25","article-title":"Cross-database face anti-spoofing with robust feature representation","author":"patel","year":"2016","journal-title":"CCBR"}],"event":{"name":"2020 IEEE International Joint Conference on Biometrics (IJCB)","location":"Houston, TX, USA","start":{"date-parts":[[2020,9,28]]},"end":{"date-parts":[[2020,10,1]]}},"container-title":["2020 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9304574\/9304852\/09304873.pdf?arnumber=9304873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:56:20Z","timestamp":1656453380000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9304873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/ijcb48548.2020.9304873","relation":{},"subject":[],"published":{"date-parts":[[2020,9,28]]}}}