{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T00:23:35Z","timestamp":1778372615439,"version":"3.51.4"},"reference-count":75,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61927809"],"award-info":[{"award-number":["61927809"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003399","name":"STCSM","doi-asserted-by":"publisher","award":["22DZ2229005"],"award-info":[{"award-number":["22DZ2229005"]}],"id":[{"id":"10.13039\/501100003399","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3371266","type":"journal-article","created":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T18:51:44Z","timestamp":1709146304000},"page":"4058-4069","source":"Crossref","is-referenced-by-count":32,"title":["MFAE: Masked Frequency Autoencoders for Domain Generalization Face Anti-Spoofing"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-5270-4746","authenticated-orcid":false,"given":"Tianyi","family":"Zheng","sequence":"first","affiliation":[{"name":"Department of Electronic Engineering, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7817-0665","authenticated-orcid":false,"given":"Bo","family":"Li","sequence":"additional","affiliation":[{"name":"YouTu Laboratory, Tencent, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1237-2656","authenticated-orcid":false,"given":"Shuang","family":"Wu","sequence":"additional","affiliation":[{"name":"YouTu Laboratory, Tencent, Shanghai, China"}]},{"given":"Ben","family":"Wan","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6246-1724","authenticated-orcid":false,"given":"Guodong","family":"Mu","sequence":"additional","affiliation":[{"name":"YouTu Laboratory, Tencent, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4836-7667","authenticated-orcid":false,"given":"Shice","family":"Liu","sequence":"additional","affiliation":[{"name":"YouTu Laboratory, Tencent, Shanghai, China"}]},{"given":"Shouhong","family":"Ding","sequence":"additional","affiliation":[{"name":"YouTu Laboratory, Tencent, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1714-3206","authenticated-orcid":false,"given":"Jia","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1117\/12.541955"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3307908"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19772-7_31"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW59228.2023.00674"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00851"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2017.77"},{"key":"ref7","article-title":"Content-based unrestricted adversarial attack","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Chen"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3183398"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2022.3184500"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00409"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2010.11929"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19778-9_3"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/165"},{"key":"ref14","first-page":"125","article-title":"Multi-teacher single-student visual transformer with multi-level attention for face spoofing detection","volume-title":"Brit. Mach. Vis. Conf.","author":"Huang"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484333"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19775-8_30"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICME52920.2022.9859783"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01026"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6873"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16199"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6866"},{"key":"ref22","article-title":"Few-shot domain expansion for face anti-spoofing","author":"Yang","year":"2021","journal-title":"arXiv:2106.14162"},{"key":"ref23","volume-title":"Digital Image Processing","author":"Gonz\u00e1lez","year":"2009"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01415"},{"key":"ref25","first-page":"13255","article-title":"A Fourier perspective on model robustness in computer vision","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Yin"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"ref27","article-title":"Deep frequent spatial temporal learning for face anti-spoofing","volume":"abs\/2002.03723","author":"Huang","year":"2020","journal-title":"arXiv:2002.03723"},{"key":"ref28","article-title":"Rethinking vision transformer and masked autoencoder in multimodal face anti-spoofing","author":"Yu","year":"2023","journal-title":"arXiv:2302.05744"},{"key":"ref29","article-title":"Masked autoencoders are scalable vision learners","author":"He","year":"2021","journal-title":"arXiv:2111.06377"},{"key":"ref30","first-page":"121","article-title":"LBP\u2013TOP based countermeasure against face spoofing attacks","volume-title":"Proc. ACCV","author":"d. Freitas Pereira"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578288"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00048"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00509"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_5"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00604"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1049\/bme2.12002"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00122"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2020.2973001"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916652"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00202"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987247"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3065495"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3296330"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01888"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3233774"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3198275"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2021.3053698"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3055018"},{"key":"ref51","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018","journal-title":"arXiv:1810.04805"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00943"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01426"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i2.25252"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19821-2_9"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01462"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-00551-4_4"},{"key":"ref58","article-title":"A closer look at self-supervised lightweight vision transformers","author":"Wang","year":"2022","journal-title":"arXiv:2205.14443"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3036338"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475279"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/120"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01964"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01959"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02353"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400395"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00671"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199754"},{"key":"ref68","first-page":"1","article-title":"On the effectiveness of local binary patterns in face anti-spoofing","volume-title":"Proc. Int. Conf. Biometrics Special Interest Group (BIOSIG)","author":"Chingovska"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00481"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"ref71","article-title":"Masked frequency modeling for self-supervised visual pre-training","author":"Xie","year":"2022","journal-title":"arXiv:2206.07706"},{"key":"ref72","article-title":"Student collaboration improves self-supervised learning: Dual-loss adaptive masked autoencoder for brain cell image analysis","author":"Ly","year":"2022","journal-title":"arXiv:2205.05194"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01000"},{"key":"ref74","article-title":"Uniform masking: Enabling MAE pre-training for pyramid-based vision transformers with locality","author":"Li","year":"2022","journal-title":"arXiv:2205.10063"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.319"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/10319981\/10453286.pdf?arnumber=10453286","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T04:37:19Z","timestamp":1725338239000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10453286\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":75,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3371266","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}