{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T15:53:28Z","timestamp":1769183608366,"version":"3.49.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,4]]},"DOI":"10.1109\/ijcb52358.2021.9484383","type":"proceedings-article","created":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T20:34:10Z","timestamp":1626813250000},"page":"1-8","source":"Crossref","is-referenced-by-count":9,"title":["Leveraging Adversarial Learning for the Detection of Morphing Attacks"],"prefix":"10.1109","author":[{"given":"Zander","family":"Blasingame","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chen","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IPTA.2019.8936088"},{"key":"ref32","article-title":"Face Morphing Attack Generation & Detection: A Comprehensive Survey","author":"venkatesh","year":"2020"},{"key":"ref31","first-page":"1","article-title":"Evaluation of automatic face recognition for automatic border control on actual data recorded of travellers at schiphol airport","author":"spreeuwers","year":"2012","journal-title":"Proc of the Int&#x2019;l Conf of Biometrics Special Interest Group (BIOSIG)"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/978-3-319-64185-0_9","article-title":"Detection of face morphing attacks by deep learning","author":"seibold","year":"2017","journal-title":"Digital Forensics and Watermarking"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref11","first-page":"1755","article-title":"Dlib-ml: A machine learning toolkit","volume":"10","author":"king","year":"2009","journal-title":"J Mach Learn Res"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/218380.218501"},{"key":"ref13","first-page":"380","article-title":"Active shape models with sift descriptors and mars","volume":"2","author":"milborrow","year":"2014","journal-title":"2014 International conference on computer vision theory and applications (VISAPP)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8292"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(95)00067-4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(97)00070-X"},{"key":"ref17","author":"quek","year":"2019","journal-title":"Facemorpher"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272742"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791169"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DAS.2018.11"},{"key":"ref4","article-title":"Tripletgan: Training generative model with triplet loss","author":"cao","year":"2017"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2017.7935088"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.1996.557254"},{"key":"ref6","article-title":"Face research lab london set","author":"debruine","year":"0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2994750"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698563"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28501-6_9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00453"},{"key":"ref9","first-page":"1363","article-title":"Bsif: Binarized statistical image features","author":"kannala","year":"2012","journal-title":"Proceedings of the 21st Int&#x2019;l Conf on Pattern Recognition (ICPR2012)"},{"key":"ref1","year":"2017","journal-title":"Information technology &#x2013; Biometric presentation attack detection &#x2013; Part 3 Testing and reporting"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.228"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3038924"},{"key":"ref21","first-page":"1","article-title":"Morphing attack detection - database, evaluation platform and benchmarking","author":"raja","year":"2020","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1145\/1141911.1141920","article-title":"Image deformation using moving least squares","volume":"25","author":"schaefer","year":"2006","journal-title":"ACM Trans Graph"},{"key":"ref23","author":"sarkar","year":"2020","journal-title":"Vulnerability analysis of face morphing attacks from landmarks and generative adversarial networks"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2019.0206"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2019.2942395"}],"event":{"name":"2021 IEEE International Joint Conference on Biometrics (IJCB)","location":"Shenzhen, China","start":{"date-parts":[[2021,8,4]]},"end":{"date-parts":[[2021,8,7]]}},"container-title":["2021 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9484326\/9484328\/09484383.pdf?arnumber=9484383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:48:13Z","timestamp":1652197693000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9484383\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,4]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/ijcb52358.2021.9484383","relation":{},"subject":[],"published":{"date-parts":[[2021,8,4]]}}}