{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:49:45Z","timestamp":1729637385206,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T00:00:00Z","timestamp":1666137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T00:00:00Z","timestamp":1666137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,19]]},"DOI":"10.1109\/kse56063.2022.9953623","type":"proceedings-article","created":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T21:25:53Z","timestamp":1669065953000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["A liveness detection protocol based on deep visual-linguistic alignment"],"prefix":"10.1109","author":[{"given":"Viet-Trung","family":"Tran","sequence":"first","affiliation":[{"name":"Hanoi University of Science and Technology,Hanoi,Vietnam"}]},{"given":"Van-Sang","family":"Tran","sequence":"additional","affiliation":[{"name":"FPT University,FPT Technology Research Institute,Hanoi,Vietnam"}]},{"given":"Xuan-Bang","family":"Nguyen","sequence":"additional","affiliation":[{"name":"FPT University,FPT Technology Research Institute,Hanoi,Vietnam"}]},{"given":"The-Trung","family":"Tran","sequence":"additional","affiliation":[{"name":"FPT University,FPT Technology Research Institute,Hanoi,Vietnam"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/978-1-4471-6524-8_5","article-title":"Face anti-spoofing: Multi-spectral approach","author":"yi","year":"2014","journal-title":"Handbook of Biometric Anti-spoofing"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1016\/j.jvcir.2017.09.002"},{"key":"ref12","article-title":"Casia-surf cefa: A benchmark for multi-modal cross-ethnicity face anti-spoofing","author":"li","year":"2020","journal-title":"arXiv preprint arXiv 2003 07516"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TIFS.2015.2398819"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.14722\/ndss.2018.23176"},{"key":"ref15","article-title":"Aurora guard: Real-time face anti-spoofing via light reflection","author":"liu","year":"2019","journal-title":"arXiv preprint arXiv 1902 10869"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/978-3-642-28942-2_11"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/S0969-4765(19)30085-2"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/CVPR.2017.367"},{"key":"ref19","article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","author":"devlin","year":"2018","journal-title":"arXiv preprint arXiv 1810 04805"},{"year":"2016","journal-title":"International Standards Organization for Standardization","article-title":"Biometric presentation attack detection","key":"ref4"},{"key":"ref3","first-page":"1","article-title":"CASIA-SURF: A Large-scale Multi-modal Benchmark for Face Anti-spoofing","volume":"xx","author":"zhang","year":"2019","journal-title":"ArXiv"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"ref5","first-page":"1","article-title":"Face spoofing detection from single images using micro-texture analysis","author":"m\u00e4\u00e4tt\u00e4","year":"2011","journal-title":"2011 International Joint Conference on Biometrics (IJCB)"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/CVPR.2018.00048"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ICB.2013.6612957"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/BTAS.2017.8272713"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/TIFS.2015.2400395"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TIP.2015.2395951"},{"key":"ref20","article-title":"Attention Is All You Need","volume":"abs 1706 0","author":"vaswani","year":"2017","journal-title":"CoRR"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/1143844.1143891"},{"key":"ref21","first-page":"1","article-title":"ViLBERT: Pretraining task-agnostic visiolinguistic representations for vision-and-language tasks","author":"lu","year":"2019","journal-title":"ArXiv"},{"key":"ref24","first-page":"251","article-title":"Out of time: automated lip sync in the wild","author":"chung","year":"2016","journal-title":"Asian Conference on Computer Vision"},{"key":"ref23","article-title":"Refineface: Refinement neural network for high performance face detection","author":"zhang","year":"2020","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"}],"event":{"name":"2022 14th International Conference on Knowledge and Systems Engineering (KSE)","start":{"date-parts":[[2022,10,19]]},"location":"Nha Trang, Vietnam","end":{"date-parts":[[2022,10,21]]}},"container-title":["2022 14th International Conference on Knowledge and Systems Engineering (KSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9953734\/9953612\/09953623.pdf?arnumber=9953623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,13]],"date-time":"2023-03-13T09:14:40Z","timestamp":1678698880000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9953623\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,19]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/kse56063.2022.9953623","relation":{},"subject":[],"published":{"date-parts":[[2022,10,19]]}}}