{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T05:13:28Z","timestamp":1768972408983,"version":"3.49.0"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62271280"],"award-info":[{"award-number":["62271280"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62222114"],"award-info":[{"award-number":["62222114"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62071428"],"award-info":[{"award-number":["62071428"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1109\/tdsc.2024.3445570","type":"journal-article","created":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T17:39:39Z","timestamp":1724089179000},"page":"1551-1566","source":"Crossref","is-referenced-by-count":1,"title":["Multi-Modal Spoofing Attacks on 3D Face Liveness Detection via a Single 2D Photo"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-1009-5583","authenticated-orcid":false,"given":"Zhihao","family":"Wu","sequence":"first","affiliation":[{"name":"Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0888-2322","authenticated-orcid":false,"given":"Yushi","family":"Cheng","sequence":"additional","affiliation":[{"name":"Ubiquitous System Security Lab (USSLAB), ZJU-UIUC Institute, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1101-0007","authenticated-orcid":false,"given":"Xiaoyu","family":"Ji","sequence":"additional","affiliation":[{"name":"Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5043-9148","authenticated-orcid":false,"given":"Wenyuan","family":"Xu","sequence":"additional","affiliation":[{"name":"Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1885","article-title":"DoubleStar long-range attack towards depth estimation based obstacle avoidance in autonomous systems","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Zhou"},{"key":"ref2","article-title":"3Divi face SDK 3.14.0","year":"2022"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.04.015"},{"key":"ref4","article-title":"Alibaba cloud facebody sdk v2.0 for python","year":"2019"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117503"},{"key":"ref7","article-title":"About face id advanced technology, learn how face id helps protect your information on your iphone and ipad pro","year":"2024"},{"key":"ref8","article-title":"ArcSoft arcface windows V3.0","year":"2019"},{"key":"ref9","article-title":"Baidu face offline SDK windows C++ V6.1","year":"2021"},{"key":"ref10","article-title":"Customer cases of baidu face authentication application kit","year":"2021"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698550"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2630740"},{"issue":"11","key":"ref14","first-page":"122","article-title":"The OpenCV library","volume":"25","author":"Bradski","year":"2000","journal-title":"Dr Dobb\u2019s J. Softw. Tools"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(18)30010-9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339815"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117509"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MIPR49039.2020.00048"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1117\/12.2253264"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SVR51698.2020.00046"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37410-4_11"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00790"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ijcb52358.2021.9484333"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00779"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.81"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2343913"},{"key":"ref27","first-page":"2484","article-title":"Simple black-box adversarial attacks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Guo"},{"key":"ref28","article-title":"Meaningful adversarial stickers for face recognition in physical world","author":"Guo","year":"2021"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SSIAI.2010.5483908"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-010-0360-8"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71629-7_50"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888436"},{"key":"ref34","first-page":"1755","article-title":"DLIB-ML: A machine learning toolkit","volume":"10","author":"King","year":"2009","journal-title":"J. Mach. Learn. Res."},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412236"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00095"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8546026"},{"key":"ref39","article-title":"Characterizing adversarial subspaces using local intrinsic dimensionality","author":"Ma","year":"2018"},{"key":"ref40","first-page":"1","article-title":"Spoofing in 2D face recognition with 3D masks and anti-spoofing with kinect","volume-title":"Proc. IEEE 6th Int. Conf. Biometrics: Theory Appl. Syst.","author":"Nesli"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00415"},{"key":"ref42","article-title":"Deep k-nearest neighbors: Towards confident, interpretable and robust deep learning","author":"Papernot","year":"2018"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00204"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578288"},{"key":"ref45","article-title":"3D camera market revenue forecast report: Size, share, recent trends, strategic developments, segmentation analysis, and evolving opportunities, 2024.2030","year":"2023"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2395951"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3351261"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW54805.2022.00036"},{"key":"ref52","first-page":"877","article-title":"Towards robust LiDAR-based perception in autonomous driving: General black-box adversarial sensor attack and countermeasures","volume-title":"Proc. 29th {USENIX} Secur. Symp.","author":"Sun"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICME46284.2020.9102720"},{"key":"ref54","article-title":"Tencent cloud face SDKs win V1.0.1.14","year":"2020"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01373"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-023-00871-1"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICCI51257.2020.9247836"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3176760"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179429"},{"key":"ref60","article-title":"Learn convolutional neural network for face anti-spoofing","author":"Yang","year":"2014"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.401-403.180"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3036801"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.23"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-26409-2_19"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/10925471\/10639356.pdf?arnumber=10639356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T21:19:29Z","timestamp":1742246369000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10639356\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":65,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2024.3445570","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3]]}}}