{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,19]],"date-time":"2026-05-19T15:04:40Z","timestamp":1779203080950,"version":"3.51.4"},"reference-count":89,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Hong Kong Innovation and Technology Commission"},{"DOI":"10.13039\/100007567","name":"City University of Hong Kong","doi-asserted-by":"publisher","award":["9610528"],"award-info":[{"award-number":["9610528"]}],"id":[{"id":"10.13039\/100007567","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Grant Council of Hong Kong","award":["21200522"],"award-info":[{"award-number":["21200522"]}]},{"name":"Hong Kong Innovation and Technology Commission"},{"name":"Research Grant Council General Research Fund","award":["11203220"],"award-info":[{"award-number":["11203220"]}]},{"name":"Anderson Rocha","award":["2023\/12865-8"],"award-info":[{"award-number":["2023\/12865-8"]}]},{"name":"Anderson Rocha","award":["2017\/12646-3"],"award-info":[{"award-number":["2017\/12646-3"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tdsc.2024.3381598","type":"journal-article","created":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T20:39:34Z","timestamp":1711485574000},"page":"5650-5666","source":"Crossref","is-referenced-by-count":35,"title":["M3FAS: An Accurate and Robust MultiModal Mobile Face Anti-Spoofing System"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3958-6489","authenticated-orcid":false,"given":"Chenqi","family":"Kong","sequence":"first","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0324-867X","authenticated-orcid":false,"given":"Kexin","family":"Zheng","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2862-5542","authenticated-orcid":false,"given":"Yibing","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3583-959X","authenticated-orcid":false,"given":"Shiqi","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4236-8212","authenticated-orcid":false,"given":"Anderson","family":"Rocha","sequence":"additional","affiliation":[{"name":"Artificial Intelligence Lab. (Recod.ai), University of Campinas, Campinas, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8723-8112","authenticated-orcid":false,"given":"Haoliang","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Electrical and Engineering, City University of Hong Kong, Kowloon Tong, Hong Kong"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"AFR market, [EB\/OL]","year":"2021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578288"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37410-4_11"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400395"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2630740"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3065495"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2985530"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00509"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988168"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCDS.2021.3064679"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987247"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858580"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2018.8397099"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483243"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3356250.3360045"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488737"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241575"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3202115"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1561\/116.00000069"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15567-3_37"},{"key":"ref23","article-title":"Learn convolutional neural network for face anti-spoofing","author":"Yang","year":"2014"},{"key":"ref24","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CTISC49998.2020.00025"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACPR.2015.7486482"},{"key":"ref28","first-page":"1\u201312","article-title":"Face anti-spoofing via sample learning based recurrent neural network (RNN)","volume-title":"Proc. Brit. Mach. Vis. Conf.","author":"Muhammad"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00362"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3036338"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272713"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00048"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3158551"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2024.3420699"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00203"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00333"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00122"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3332218"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MIPR59079.2023.00033"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-01824-4"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1049\/bme2.12002"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2023.3296330"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7900300"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2024.3352049"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3345336.3345345"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00024"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00202"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3351001"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08952-0"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00199"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58523-5_24"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/DICTA51227.2020.9363382"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053587"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987370"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00481"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2019.00062"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_5"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58571-6_33"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057220"},{"key":"ref61","article-title":"About face id advanced technology","year":"2018"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3419206"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23176"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2024.3367781"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2959203"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3048659"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3048659"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1978.10837"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2007.4409068"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117503"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199754"},{"key":"ref72","first-page":"1","article-title":"On the effectiveness of local binary patterns in face anti-spoofing","volume-title":"Proc. Int. Conf. Biometrics Special Int. Group","author":"Chingovska"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2015.7139082"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28501-6_8"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2017.77"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2801312"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.3042082"},{"key":"ref78","first-page":"1755","article-title":"Dlib-ml: A machine learning toolkit","volume":"10","author":"King","year":"2009","journal-title":"J. Mach. Learn. Res."},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3057457"},{"key":"ref80","article-title":"PyTorch: An imperative style, high-performance deep learning library","volume-title":"Proc. 33rd Int. Conf. Neural Inf. Process. Syst.","author":"Paszke"},{"key":"ref81","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3193130"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3162718"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3055018"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3115465"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19809-0_35"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10750463\/10480258.pdf?arnumber=10480258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:11:05Z","timestamp":1732666265000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10480258\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":89,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2024.3381598","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}