{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:08:32Z","timestamp":1761664112791,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1109\/iwbf49977.2020.9107949","type":"proceedings-article","created":{"date-parts":[[2020,6,4]],"date-time":"2020-06-04T16:31:04Z","timestamp":1591288264000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Interpretable Biometrics: Should We Rethink How Presentation Attack Detection is Evaluated?"],"prefix":"10.1109","author":[{"given":"Ana F.","family":"Sequeira","sequence":"first","affiliation":[]},{"given":"Wilson","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Joao Ribeiro","family":"Pinto","sequence":"additional","affiliation":[]},{"given":"Tiago","family":"Goncalves","sequence":"additional","affiliation":[]},{"given":"Jaime S.","family":"Cardoso","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.3390\/electronics8080832"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TIFS.2015.2464772"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TSP.2016.7760965"},{"key":"ref12","first-page":"1","article-title":"Adversarial learning for a robust iris presentation attack detection method against unseen attack presentations","author":"ferreira","year":"2019","journal-title":"2019 International Conference of the Biometrics Special Interest Group (BIOSIG)"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/j.dsp.2017.10.011"},{"year":"2017","author":"kim","article-title":"Interpretability beyond feature attribution: Quantitative testing with concept activation vectors (tcav)","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/978-3-030-02628-8_15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/IJCNN.2019.8852409"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/978-3-030-02628-8_14"},{"key":"ref18","first-page":"588","article-title":"CARE: Class attention to regions of lesion for classification on imbalanced data","author":"zhuang","year":"2019","journal-title":"International Conference on Medical Imaging with Deep Learning"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ICCV.2017.74"},{"year":"2017","author":"kotikalapudi","article-title":"keras-vis","key":"ref28"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1312e","DOI":"10.1002\/widm.1312","article-title":"Causability and explainabilty of artificial intelligence in medicine","author":"holzinger","year":"2019","journal-title":"Wiley Interdisciplinary Reviews Data Mining Knowl Disc"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/LSP.2016.2603342"},{"year":"2017","author":"samek","article-title":"Explainable artificial intelligence: Understanding, visualizing and interpreting deep learning models","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/CVPR.2016.318"},{"year":"2017","journal-title":"International Organization for Standardization ISO","article-title":"Information Technology - Biometrics - Presentation attack detection Part 3: Testing and Reporting","key":"ref29"},{"year":"2017","author":"doshi-velez","article-title":"Towards a rigorous science of interpretable machine learning","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/CVPRW.2019.00201"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/978-3-030-28954-6_1"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/CVPR.2014.223"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/978-3-319-92627-8_10"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1371\/journal.pone.0181142"},{"year":"2017","author":"bojarski","article-title":"Explaining how a deep neural network trained with end-to-end learning steers a car","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.18653\/v1\/W17-5221"},{"year":"2018","author":"seibold","article-title":"Accurate and robust neural networks for security related applications exampled by face morphing attacks","key":"ref24"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/ICCVW.2019.00064"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TIFS.2018.2801312"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/CVPR.2016.319"}],"event":{"name":"2020 8th International Workshop on Biometrics and Forensics (IWBF)","start":{"date-parts":[[2020,4,29]]},"location":"Porto, Portugal","end":{"date-parts":[[2020,4,30]]}},"container-title":["2020 8th International Workshop on Biometrics and Forensics (IWBF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9105916\/9107938\/09107949.pdf?arnumber=9107949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T19:23:13Z","timestamp":1696188193000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9107949\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/iwbf49977.2020.9107949","relation":{},"subject":[],"published":{"date-parts":[[2020,4]]}}}