{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T06:06:20Z","timestamp":1769753180074,"version":"3.49.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100010002","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,4]]},"DOI":"10.1109\/ijcb52358.2021.9484343","type":"proceedings-article","created":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T20:34:10Z","timestamp":1626813250000},"page":"1-8","source":"Crossref","is-referenced-by-count":31,"title":["Iris Presentation Attack Detection by Attention-based and Deep Pixel-wise Binary Supervision Network"],"prefix":"10.1109","author":[{"given":"Meiling","family":"Fang","sequence":"first","affiliation":[{"name":"Fraunhofer Institute for Computer Graphics Research IGD,Darmstadt,Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Naser","family":"Damer","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Computer Graphics Research IGD,Darmstadt,Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fadi","family":"Boutros","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Computer Graphics Research IGD,Darmstadt,Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Florian","family":"Kirchbuchner","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Computer Graphics Research IGD,Darmstadt,Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arjan","family":"Kuijper","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Computer Graphics Research IGD,Darmstadt,Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.1040"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272763"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00287"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2313025"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987370"},{"key":"ref11","article-title":"Generalized iris presentation attack detection algorithm under cross-database settings","author":"gupta","year":"2021","journal-title":"2020 IEEE ICPR Milano Congress Center"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2014.296"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref15","year":"2017","journal-title":"ISO\/IEC CD 30107-3 2016 Information technology &#x2013; Biometric presentation attack detection &#x2013; Part 3 Testing and reporting"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.12.013"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1672","DOI":"10.1109\/ACCESS.2015.2477470","article-title":"Robust detection of textured contact lenses in iris recognition using BSIF","volume":"3","author":"d","year":"2015","journal-title":"IEEE Access"},{"key":"ref18","first-page":"1","article-title":"Variation in accuracy of textured contact lens detection based on sensor and lens pattern","author":"d","year":"2013","journal-title":"IEEE 6th BTAS 2013"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5220\/0008983904280434"},{"key":"ref28","first-page":"3","article-title":"CBAM: convolutional block attention module","author":"woo","year":"2018","journal-title":"Computer Vision - 15 th ECCV 2018 Munich Germany September 8-14 2018 Proceedings Part VII volume 11211 of Lecture Notes in Computer Science"},{"key":"ref4","first-page":"97","article-title":"An explainable attention-guided iris presentation attack detector","author":"chen","year":"2021","journal-title":"IEEE WACV Workshops 2021"},{"key":"ref27","first-page":"1","article-title":"Counterfeit iris detection based on texture analysis","author":"wei","year":"2008","journal-title":"19th ICPR"},{"key":"ref3","article-title":"On benchmarking iris recognition within a head-mounted display for ar\/vr applications","author":"boutros","year":"2020","journal-title":"2020 IEEE IJCB 2020 Sept 28 &#x2013; Oct 1 2020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.23919\/FUSION45008.2020.9190424"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2018.00099"},{"key":"ref5","first-page":"1","article-title":"Iris liveness detection competition (livdet-iris) - the 2020 edition","author":"das","year":"2020","journal-title":"IEEE IJCB online 28 09-01 10 2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/Eusipco47968.2020.9287321"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2020.104057"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2020.104007"},{"key":"ref9","first-page":"1","article-title":"Micro stripes analyses for iris presentation attack detection","author":"fang","year":"2020","journal-title":"2020 IEEE International Joint Conference on Biometrics IJCB 2020 online Sep 28 - Oct 1 2020"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1282280.1282340"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613021"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2878542"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791168"},{"key":"ref24","first-page":"1","article-title":"D-netpad: An explainable and interpretable iris presentation attack detector","author":"sharma","year":"2020","journal-title":"2020 IEEE International Joint Conference on Biometrics IJCB 2020"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00048"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00020"},{"key":"ref25","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2015","journal-title":"ICLR 2015 San Diego CA USA May 7-9 2015 Conference Track Proceedings"}],"event":{"name":"2021 IEEE International Joint Conference on Biometrics (IJCB)","location":"Shenzhen, China","start":{"date-parts":[[2021,8,4]]},"end":{"date-parts":[[2021,8,7]]}},"container-title":["2021 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9484326\/9484328\/09484343.pdf?arnumber=9484343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:48:13Z","timestamp":1652197693000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9484343\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,4]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/ijcb52358.2021.9484343","relation":{},"subject":[],"published":{"date-parts":[[2021,8,4]]}}}