{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T15:56:15Z","timestamp":1776441375547,"version":"3.51.2"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62076163"],"award-info":[{"award-number":["62076163"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["91959108"],"award-info":[{"award-number":["91959108"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012271","name":"Shenzhen Fundamental Research and Discipline Layout project","doi-asserted-by":"publisher","award":["JCYJ20190808163401646"],"award-info":[{"award-number":["JCYJ20190808163401646"]}],"id":[{"id":"10.13039\/501100012271","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012271","name":"Shenzhen Fundamental Research and Discipline Layout project","doi-asserted-by":"publisher","award":["JCYJ20180305125822769"],"award-info":[{"award-number":["JCYJ20180305125822769"]}],"id":[{"id":"10.13039\/501100012271","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100009019","name":"Tencent \u201cRhinoceros Birds\u201d\u2014Scientific Research Foundation for Young Teachers of Shenzhen University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100009019","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1109\/tcyb.2021.3081764","type":"journal-article","created":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T19:48:51Z","timestamp":1623872931000},"page":"12315-12328","source":"Crossref","is-referenced-by-count":31,"title":["Fingerprint Presentation Attack Detector Using Global-Local Model"],"prefix":"10.1109","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1191-3529","authenticated-orcid":false,"given":"Haozhe","family":"Liu","sequence":"first","affiliation":[{"name":"Computer Vision Institute, College of Computer Science and Software Engineering, SZU Branch, Shenzhen Institute of Artificial Intelligence and Robotics for Society, the National Engineering Laboratory for Big Data System Computing Technology, and the Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9107-4272","authenticated-orcid":false,"given":"Wentian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Computer Vision Institute, College of Computer Science and Software Engineering, SZU Branch, Shenzhen Institute of Artificial Intelligence and Robotics for Society, the National Engineering Laboratory for Big Data System Computing Technology, and the Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1493-5352","authenticated-orcid":false,"given":"Feng","family":"Liu","sequence":"additional","affiliation":[{"name":"Computer Vision Institute, College of Computer Science and Software Engineering, SZU Branch, Shenzhen Institute of Artificial Intelligence and Robotics for Society, the National Engineering Laboratory for Big Data System Computing Technology, and the Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen University, Shenzhen, China"}]},{"given":"Haoqian","family":"Wu","sequence":"additional","affiliation":[{"name":"Computer Vision Institute, College of Computer Science and Software Engineering, SZU Branch, Shenzhen Institute of Artificial Intelligence and Robotics for Society, the National Engineering Laboratory for Big Data System Computing Technology, and the Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1420-0815","authenticated-orcid":false,"given":"Linlin","family":"Shen","sequence":"additional","affiliation":[{"name":"Computer Vision Institute, College of Computer Science and Software Engineering, SZU Branch, Shenzhen Institute of Artificial Intelligence and Robotics for Society, the National Engineering Laboratory for Big Data System Computing Technology, and the Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen University, Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.52"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2957188"},{"key":"ref3","volume-title":"Oct fingerprints: Resilience to presentation attacks","author":"Chugh","year":"2019"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698587"},{"key":"ref5","first-page":"1","article-title":"An evaluation of presentation attack detection of fingerprint biometric systems applying ISO\/IEC 30107-3","volume-title":"Proc. Int. Biometr. Perform. Test. Conf.","author":"Goicoechea-Telleria"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.03.053"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2013.0020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2617756"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TBCAS.2008.2003432"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2010.02.016"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3052341"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1117\/12.543045"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987374"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_33"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.879289"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04391-8_41"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CGIV.2008.9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398817"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2520880"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812193"},{"key":"ref21","author":"Simonyan","year":"2014","journal-title":"Very deep convolutional networks for large-scale image recognition"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5555\/2999134.2999257"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00052"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2990789"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2016.07.002"},{"key":"ref26","first-page":"1","article-title":"LivDet 2015 fingerprint liveness detection competition 2015","volume-title":"Proc. 7th IEEE Int. Conf. Biometr. Theory Appl. Syst. (BTAS)","author":"Marcialis"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2464772"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987319"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823572"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987320"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.338"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2858764"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2020.2967513"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.visres.2008.07.012"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2018.00097"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.319"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10590-1_53"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01229"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.687"},{"key":"ref42","first-page":"549","article-title":"Self-erasing network for integral object attention","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Hou"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2647965"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2856821"},{"key":"ref45","volume-title":"Improved regularization of convolutional neural networks with cutout","author":"DeVries","year":"2017"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00140"},{"key":"ref47","volume-title":"MobileNets: Efficient convolutional neural networks for mobile vision applications","author":"Howard","year":"2017"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00293"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46475-6_43"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32251-9_42"},{"key":"ref53","article-title":"PyTorch: An imperative style, high-performance deep learning library","volume-title":"Advances in Neural Information Processing Systems","volume":"32","author":"Paszke","year":"2019"},{"key":"ref54","volume-title":"Pruning convolutional neural networks for resource efficient inference","author":"Molchanov","year":"2016"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/9920527\/09457215.pdf?arnumber=9457215","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T17:31:29Z","timestamp":1748539889000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9457215\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11]]},"references-count":54,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2021.3081764","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"value":"2168-2267","type":"print"},{"value":"2168-2275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11]]}}}