{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:27:37Z","timestamp":1730266057872,"version":"3.28.0"},"reference-count":54,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T00:00:00Z","timestamp":1695600000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T00:00:00Z","timestamp":1695600000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,25]]},"DOI":"10.1109\/ijcb57857.2023.10448876","type":"proceedings-article","created":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T18:31:14Z","timestamp":1709317874000},"page":"1-10","source":"Crossref","is-referenced-by-count":2,"title":["Towards Generalizable Morph Attack Detection with Consistency Regularization"],"prefix":"10.1109","author":[{"given":"Hossein","family":"Kashiani","sequence":"first","affiliation":[{"name":"West Virginia University"}]},{"given":"Niloufar Alipour","family":"Talemi","sequence":"additional","affiliation":[{"name":"West Virginia University"}]},{"given":"Mohammad Saeed Ebrahimi","family":"Saadabadi","sequence":"additional","affiliation":[{"name":"West Virginia University"}]},{"given":"Nasser M.","family":"Nasrabadi","sequence":"additional","affiliation":[{"name":"West Virginia University"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00685"},{"key":"ref2","article-title":"Learning with pseudo-ensembles","volume-title":"Advances in Neural Information Processing Systems","volume":"27","author":"Bachman"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01141"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00167"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90439-5_23"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.23919\/FUSION43075.2019.9011378"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30645-8_32"},{"volume-title":"Face research lab london set","year":"2017","author":"DeBruine","key":"ref8"},{"key":"ref9","article-title":"Improved regularization of convolutional neural networks with cutout","author":"DeVries","year":"2017","journal-title":"arXiv preprint arXiv:1708.04552"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-022-01723-4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB54206.2022.10008003"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/bme2.12094"},{"article-title":"Imagenet-trained CNNs are biased towards texture; increasing shape bias improves accuracy and robustness","volume-title":"International Conference on Learning Representations","author":"Geirhos","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3188668"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00682"},{"key":"ref16","article-title":"Face morphing attack detection using privacy-aware training data","author":"Ivanovska","year":"2022","journal-title":"arXiv preprint arXiv:2207.00899"},{"key":"ref17","first-page":"10","article-title":"Style augmentation: data augmentation via style randomization","volume-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops","volume":"6","author":"Jackson"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1603.08155"},{"key":"ref19","first-page":"12104","article-title":"Training generative adversarial networks with limited data","author":"Karras","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB54206.2022.10007929"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2945942"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00566"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3241606"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW58289.2023.00057"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/BIOSIG55365.2022.9897057"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2017.0147"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ijcb54206.2022.10007973"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994112"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01225-0_29"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(97)00070-X"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.268"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2022.104535"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.23919\/FUSION49751.2022.9841318"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW54805.2022.00047"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00607"},{"key":"ref38","article-title":"Regularization with stochastic transformations and perturbations for deep semi-supervised learning","volume-title":"Advances in Neural Information Processing Systems","volume":"29","author":"Sajjadi"},{"article-title":"Vulnerability analysis of face morphing attacks from landmarks and generative adversarial networks","volume-title":"arXiv preprint","author":"Sarkar","key":"ref39"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00177"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IPTA.2019.8936088"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/WACV45572.2020.9093488"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3152615"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01415"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00913"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00219"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7687-1_79"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3072349"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00123"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3195549"},{"article-title":"Domain generalization with mixstyle","volume-title":"International Conference on Learning Representations","author":"Zhou","key":"ref52"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3112012"},{"article-title":"Crossmatch: Cross-classifier consistency regularization for open-set single domain generalization","volume-title":"International Conference on Learning Representations","author":"Zhu","key":"ref54"}],"event":{"name":"2023 IEEE International Joint Conference on Biometrics (IJCB)","start":{"date-parts":[[2023,9,25]]},"location":"Ljubljana, Slovenia","end":{"date-parts":[[2023,9,28]]}},"container-title":["2023 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10447019\/10448524\/10448876.pdf?arnumber=10448876","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T01:22:30Z","timestamp":1709860950000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10448876\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,25]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/ijcb57857.2023.10448876","relation":{},"subject":[],"published":{"date-parts":[[2023,9,25]]}}}