{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T11:00:53Z","timestamp":1759230053280,"version":"3.28.0"},"reference-count":62,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179351","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"882-898","source":"Crossref","is-referenced-by-count":2,"title":["Spoofing Real-world Face Authentication Systems through Optical Synthesis"],"prefix":"10.1109","author":[{"given":"Yueli","family":"Yan","sequence":"first","affiliation":[{"name":"ShanghaiTech University,School of Information Science and Technology,China"}]},{"given":"Zhice","family":"Yang","sequence":"additional","affiliation":[{"name":"ShanghaiTech University,School of Information Science and Technology,China"}]}],"member":"263","reference":[{"volume-title":"Facial Recognition Market Size","year":"2023","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/2590296.2590315"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/3-540-39200-9_18"},{"volume-title":"Facial Recognition: A Safer Access Control Solution","year":"2023","key":"ref4"},{"volume-title":"WeChat Pay","year":"2023","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/S0969-4765(18)30010-9"},{"volume-title":"Apple Face ID \u2019Fooled Again\u2019. This Time By $200 Evil Twin Mask","year":"2023","key":"ref7"},{"volume-title":"The painted skin","year":"2023","key":"ref8"},{"volume-title":"Face recognition vendor test (frvt) part 2: identification","year":"2023","author":"Grother","key":"ref9"},{"volume-title":"Face recognition vendor test (frvt) part 1: verification","year":"2023","author":"Grother","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/3038924"},{"year":"2013","author":"Szegedy","journal-title":"Intriguing properties of neural networks","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/2976749.2978392"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/3491199"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ICPR48806.2021.9412236"},{"year":"2018","author":"Zhou","journal-title":"Invisible mask: Practical attacks on face recognition with infrared","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/3351261"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/3133956.3134057"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/SP.2016.41"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/TIFS.2014.2322255"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/IWBF.2019.8739236"},{"key":"ref22","first-page":"497","article-title":"Virtual u: Defeating face liveness detection by building virtual models from your public photos","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Xu"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/IASP.2009.5054589"},{"volume-title":"Facetec","year":"2023","key":"ref24"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/ICCV.2007.4409068"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.14722\/ndss.2018.23253"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.14722\/ndss.2018.23176"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/2810103.2813612"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1007\/978-3-030-05288-1_15"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/BTAS.2016.7791171"},{"key":"ref31","first-page":"1","article-title":"On the effectiveness of local binary patterns in face anti-spoofing","volume-title":"2012 BIOSIG-proceedings of the international conference of biometrics special interest group (BIOSIG)","author":"Chingovska"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/BTAS.2013.6712690"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/CVPR42600.2020.00509"},{"volume-title":"We Broke Into A Bunch Of Android Phones With A 3D-Printed Head","year":"2023","key":"ref34"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/TBIOM.2020.3010312"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/TIFS.2019.2916652"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1155\/2016\/9682453"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/WACV48630.2021.00122"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/CVPR.2019.00101"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/CVPR42600.2020.00534"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/cvprw59228.2023.00675"},{"key":"ref42","first-page":"1","article-title":"Information security technology? don\u2019t rely on it, a case study in social engineering","volume-title":"USENIX Security Symposium","volume":"5","author":"Winkler"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1049\/ic:20000468"},{"volume-title":"REAL-f CO., LTD","year":"2023","key":"ref44"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/TIFS.2016.2578288"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/ICPR.2016.7900303"},{"volume-title":"NIR Projector Module","year":"2023","key":"ref47"},{"volume-title":"Nir tn liquid crystal rotator","year":"2023","key":"ref48"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1109\/CVPRW.2019.00038"},{"volume-title":"Mean faces - using mean depth map of registered model sets","year":"2023","key":"ref50"},{"volume-title":"Photographic filter","year":"2023","key":"ref51"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1109\/CVPR.2019.00592"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1109\/IJCB52358.2021.9484332"},{"volume-title":"Image manipulation toolbox","year":"2023","key":"ref54"},{"volume-title":"Male head form","year":"2023","key":"ref55"},{"volume-title":"Bank card test center","year":"2023","key":"ref56"},{"doi-asserted-by":"publisher","key":"ref57","DOI":"10.1145\/2789168.2790112"},{"doi-asserted-by":"publisher","key":"ref58","DOI":"10.1109\/CVPR.2007.383345"},{"volume-title":"Depth Map from Stereo Images","year":"2023","key":"ref59"},{"volume-title":"SenseTime Launches Facial Verification Smart Lock for Smart-Home Industry","year":"2023","key":"ref60"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.1109\/ICCV.2017.244"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.1109\/ICASSP40776.2020.9054007"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2023,5,21]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179351.pdf?arnumber=10179351","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T04:40:29Z","timestamp":1721450429000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179351\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179351","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}