{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T00:42:05Z","timestamp":1775695325309,"version":"3.50.1"},"reference-count":75,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62371301"],"award-info":[{"award-number":["62371301"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62306061"],"award-info":[{"award-number":["62306061"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2023A1515140037"],"award-info":[{"award-number":["2023A1515140037"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1109\/tdsc.2024.3520534","type":"journal-article","created":{"date-parts":[[2024,12,20]],"date-time":"2024-12-20T19:14:14Z","timestamp":1734722054000},"page":"2597-2606","source":"Crossref","is-referenced-by-count":9,"title":["Visual Prompt Flexible-Modal Face Anti-Spoofing"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0422-6616","authenticated-orcid":false,"given":"Zitong","family":"Yu","sequence":"first","affiliation":[{"name":"School of Computing and Information Technology, Great Bay University, Dongguan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7114-8462","authenticated-orcid":false,"given":"Rizhao","family":"Cai","sequence":"additional","affiliation":[{"name":"ROSE Lab, School of EEE, Nanyang Technological University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9337-687X","authenticated-orcid":false,"given":"Yawen","family":"Cui","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, Kowloon, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7788-9368","authenticated-orcid":false,"given":"Ajian","family":"Liu","sequence":"additional","affiliation":[{"name":"National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4857-6810","authenticated-orcid":false,"given":"Changsheng","family":"Chen","sequence":"additional","affiliation":[{"name":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, College of Electronics and Information Engineering, Shenzhen University, Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW59228.2023.00675"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3215850"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/icip.2015.7351280"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2630740"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578288"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6866"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00048"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00362"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272713"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICMIP.2017.9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987370"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2021.3121140"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2022.3182509"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2022.3221532"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916652"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2010.11929"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/165"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484333"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-024-02055-1"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19836-6_20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00779"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19827-4_41"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00918"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01435"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00333"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3065526"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00509"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58571-6_33"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58529-7_38"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00851"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00409"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00481"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987247"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCDS.2021.3064679"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3013214"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00199"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00101"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3065495"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3183398"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2020.2973001"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00203"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3296330"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.aiopen.2022.10.001"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref47","article-title":"A survey on visual transformer","author":"Han","year":"2020"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3505244"},{"key":"ref49","first-page":"10347","article-title":"Training data-efficient image transformers & distillation through attention","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Touvron"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00061"},{"key":"ref52","article-title":"Transformer in transformer","author":"Han","year":"2021","journal-title":"arXiv:2103.00112"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00041"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00300"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58452-8_13"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00681"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01474"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP46576.2022.9897560"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2022.3184500"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3158062"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2021.3089908"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MIPR59079.2023.00033"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3233774"},{"key":"ref64","first-page":"14200","article-title":"Attention bottlenecks for multimodal fusion","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Nagrani"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01814"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/iccv51070.2023.00798"},{"key":"ref67","article-title":"LoRa: Low-rank adaptation of large language models","author":"Hu","year":"2021"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3547851"},{"key":"ref69","first-page":"2790","article-title":"Parameter-efficient transfer learning for NLP","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Houlsby"},{"key":"ref70","article-title":"AdaptFormer: Adapting vision transformers for scalable visual recognition","author":"Chen","year":"2022"},{"key":"ref71","article-title":"Scaling & shifting your features: A new baseline for efficient model tuning","author":"Lian","year":"2022"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00516"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.5555\/3495724.3497510"},{"key":"ref74","article-title":"ISO\/IEC JTC 1\/SC 37 biometrics: Information technology biometric presentation attack detection part 1: Framework","year":"2016"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/10992672\/10810451.pdf?arnumber=10810451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T03:26:07Z","timestamp":1747452367000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10810451\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":75,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2024.3520534","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5]]}}}