{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:23:28Z","timestamp":1740101008002,"version":"3.37.3"},"reference-count":61,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100006250","name":"Southwest University","doi-asserted-by":"publisher","award":["SWU2008045"],"award-info":[{"award-number":["SWU2008045"]}],"id":[{"id":"10.13039\/501100006250","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1109\/ijcnn55064.2022.9892155","type":"proceedings-article","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T19:56:04Z","timestamp":1664567764000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Multi-modal Face Anti-spoofing Using Multi-fusion Network and Global Depth-wise Convolution"],"prefix":"10.1109","author":[{"given":"Qian","family":"Zhou","sequence":"first","affiliation":[{"name":"Southwest University,College of computer &#x0026; Information Science"}]},{"given":"Ming","family":"Yang","sequence":"additional","affiliation":[{"name":"Southwest University,College of computer &#x0026; Information Science"}]},{"given":"Shidong","family":"Chen","sequence":"additional","affiliation":[{"name":"Chongqing Scivatar Intelligent Technology Co. Ltd,Chongqing,China"}]},{"given":"Hongzheng","family":"Yan","sequence":"additional","affiliation":[{"name":"Southwest University,College of computer &#x0026; Information Science"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.05.017"},{"journal-title":"Facenet A unified embedding for face recognition and clustering","year":"2015","author":"schroff","key":"ref38"},{"journal-title":"MobileNetV2 Inverted Residuals and Linear Bottlenecks","year":"2018","author":"sandler","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2020.3010312"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2572683"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3029879"},{"journal-title":"Dimensionality Reduction by Learning an Invariant Mapping","year":"2006","author":"hadsell","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0238058"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31654-9_15"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2020.01.002"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2021.3121140"},{"journal-title":"Static and dynamic fusion for multi-modal cross-ethnicity face anti-spoofing","year":"2019","author":"liu","key":"ref61"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272713"},{"journal-title":"Learn convolutional neural network for face anti-spoofing","year":"2014","author":"yang","key":"ref27"},{"journal-title":"Learning deep models for face anti-spoofing binary or auxiliary supervision","year":"2018","author":"liu","key":"ref29"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578288"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400395"},{"journal-title":"Difference of Gaussians[M]","year":"2013","author":"james","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199754"},{"journal-title":"Face anti-spoofing via motion magnification and multifeature videolet aggregation","year":"0","author":"bharadwaj","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37410-4_11"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2555286"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7900300"},{"journal-title":"Unpaired image-to-image translation using cycle-consistent adversarial networks","year":"2017","author":"zhu","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3065495"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412407"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2020.2973001"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00101"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3351001"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00200"},{"journal-title":"FeatherNets Convolutional Neural Networks as Light as Feather for Face Anti-spoofing","year":"2019","author":"zhang","key":"ref54"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00203"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00204"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3007032"},{"key":"ref11","first-page":"499","author":"wen","year":"2016","journal-title":"A Discriminative Feature Learning Approach for Deep Face Recognition"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3055018"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.578"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3351001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2020.2973001"},{"journal-title":"CASIA-SURF CeFA A benchmark for multi-modal cross-ethnicity face anti-spoofing","year":"2021","author":"liu","key":"ref15"},{"journal-title":"The high-quality wide multi-channel attack (hq-wmca) database","year":"2020","author":"mostaani","key":"ref16"},{"journal-title":"On the Effectiveness of Local Binary Patterns in Face Anti-spoofing","year":"2012","author":"chingovska","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2013.6622704"},{"journal-title":"Very Deep Convolutional Networks for Large-scale Image Recognition","year":"2014","author":"simonyan","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2630740"},{"journal-title":"Inception-v4 inception-resnet and the impact of residual connections on learning","year":"2016","author":"szegedy","key":"ref6"},{"journal-title":"Going Deeper with Convolutions","year":"2014","author":"szegedy","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2913372"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08952-0"},{"key":"ref9","first-page":"3","author":"woo","year":"2018","journal-title":"CBAM Convolutional Block Attention Module"},{"journal-title":"Towards good practices in face anti-spoofing An image reconstruction based method","year":"2019","author":"chen","key":"ref46"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58523-5_24"},{"key":"ref48","first-page":"1","article-title":"Data Fusion based Two-stage Cascade Framework for Multi-Modality Face Anti-Spoofing","author":"liu","year":"2021","journal-title":"IEEE Transactions on Cognitive and Developmental Systems"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/978-3-319-24574-4_28","article-title":"U-net: Convolutional networks for biomedical image segmentation","author":"ronneberger","year":"2015","journal-title":"Medical Image Computing and Computer-Assisted Intervention-MICCAI 2015A-nonymous"},{"journal-title":"Deep Tree Learning for Zero-shot Face Anti-Spoofing","year":"2019","author":"liu","key":"ref42"},{"journal-title":"Deep pixel-wise binary supervision for face presentation attack detection","year":"2019","author":"george","key":"ref41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053587"},{"journal-title":"A-DeepPixBis Attentional angular margin for face anti-spoofing","year":"2020","author":"hossain","key":"ref43"}],"event":{"name":"2022 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2022,7,18]]},"location":"Padua, Italy","end":{"date-parts":[[2022,7,23]]}},"container-title":["2022 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9891857\/9889787\/09892155.pdf?arnumber=9892155","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T23:00:14Z","timestamp":1667516414000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9892155\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/ijcnn55064.2022.9892155","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]}}}