{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T18:40:34Z","timestamp":1757702434076,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T00:00:00Z","timestamp":1695600000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T00:00:00Z","timestamp":1695600000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,25]]},"DOI":"10.1109\/ijcb57857.2023.10448619","type":"proceedings-article","created":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T18:31:14Z","timestamp":1709317874000},"page":"1-10","source":"Crossref","is-referenced-by-count":2,"title":["On Self-Supervised Learning and Prompt Tuning of Vision Transformers for Cross-sensor Fingerprint Presentation Attack Detection"],"prefix":"10.1109","author":[{"given":"Maryam","family":"Nadeem","sequence":"first","affiliation":[{"name":"MBZUAI,Abu Dhabi"}]},{"given":"Karthik","family":"Nandakumar","sequence":"additional","affiliation":[{"name":"MBZUAI,Abu Dhabi"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/21681163.2021.2012826"},{"key":"ref2","first-page":"2695","article-title":"Defraudnet: End2end fingerprint spoof detection using patch level attention","volume-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision","author":"Banerjee"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-5288-3_21"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2812193"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812193"},{"key":"ref6","article-title":"Fingerprint spoof generalization","author":"Chugh","year":"2019","journal-title":"arXiv preprint arXiv:1912.02710"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823572"},{"key":"ref8","article-title":"Clip itself is a strong fine-tuner: Achieving 85.7% and 88.0% top-1 accuracy with vit-b and vit-l on imagenet","author":"Dong","year":"2022","journal-title":"arXiv preprint arXiv:2212.06138"},{"key":"ref9","article-title":"An image is worth 16\u00d716 words: Transformers for image recognition at scale","author":"Dosovitskiy","year":"2020","journal-title":"arXiv preprint arXiv:2010.11929"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2858764"},{"key":"ref11","first-page":"66","article-title":"On the interoperability of capture devices in fingerprint presentation attacks detection","volume-title":"CEUR WORKSHOP PROCEEDINGS","volume":"1816","author":"Ghiani"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2016.07.002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987425"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01553"},{"key":"ref15","article-title":"Iec 30107-1: 2016 information technology\u2013biometric presentation attack detection\u2013part 1","author":"ISO","year":"2016","journal-title":"Information Technology Task Force (ITTF): Geneva, Switzerland"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-4154-9_39"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19827-4_41"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.20517\/jsss.2021.07"},{"key":"ref19","article-title":"Fine-tuning can distort pretrained features and underperform out-of-distribution","author":"Kumar","year":"2022","journal-title":"arXiv preprint arXiv:2202.10054"},{"volume-title":"Antifraud biometric scanner that accurately detects blood flow","year":"1998","author":"Lapsley","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/s20072085"},{"key":"ref22","first-page":"553","article-title":"On the robustness of fingerprint liveness detection algorithms against new materials used for spoofing","volume":"2","author":"Marasco","year":"2011","journal-title":"Multivariable Processing for Biometric Systems"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6524-8"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358776"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.4236\/opj.2011.13015"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1117\/12.606643"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2520880"},{"key":"ref28","article-title":"Patch-based fake fingerprint detection using a fully convolutional neural network with a small number of parameters and an optimal threshold","author":"Park","year":"2018","journal-title":"arXiv preprint arXiv:1803.07817"},{"key":"ref29","first-page":"8024","article-title":"Pytorch: An imperative style, high-performance deep learning library","author":"Paszke","year":"2019","journal-title":"Advances in Neural Information Processing Systems 32"},{"key":"ref30","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","volume-title":"International conference on machine learning","author":"Radford"},{"key":"ref31","article-title":"Mosfpad: An end-to-end ensemble of mobilenet and support vector classifier for fingerprint presentation attack detection","author":"Rai","year":"2023","journal-title":"arXiv preprint arXiv:2303.01465"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-5288-3_2"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2464772"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/s21030699"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/e23081089"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-021-02173-8"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92627-8_4"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8034"},{"key":"ref39","article-title":"Contrastive learning rivals masked image modeling in fine-tuning via feature distillation","author":"Wei","year":"2022","journal-title":"arXiv preprint arXiv:2205.14141"},{"volume-title":"Pytorch image models","year":"2019","author":"Wightman","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00943"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927357"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-022-01653-1"}],"event":{"name":"2023 IEEE International Joint Conference on Biometrics (IJCB)","start":{"date-parts":[[2023,9,25]]},"location":"Ljubljana, Slovenia","end":{"date-parts":[[2023,9,28]]}},"container-title":["2023 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10447019\/10448524\/10448619.pdf?arnumber=10448619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T01:13:08Z","timestamp":1709860388000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10448619\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,25]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/ijcb57857.2023.10448619","relation":{},"subject":[],"published":{"date-parts":[[2023,9,25]]}}}