{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T21:33:08Z","timestamp":1777411988653,"version":"3.51.4"},"reference-count":76,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Nanyang Technological University (NTU)-Peking University (PKU) Joint Research Institute"},{"name":"Science and Technology Foundation of Guangzhou Huangpu Development District","award":["2022GH15"],"award-info":[{"award-number":["2022GH15"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62371301"],"award-info":[{"award-number":["62371301"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62306061"],"award-info":[{"award-number":["62306061"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001321","name":"Guangdong Basic and Applied Basic Research Foundation","doi-asserted-by":"publisher","award":["2023A1515140037"],"award-info":[{"award-number":["2023A1515140037"]}],"id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3420699","type":"journal-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T17:53:55Z","timestamp":1719597235000},"page":"8385-8397","source":"Crossref","is-referenced-by-count":41,"title":["S-Adapter: Generalizing Vision Transformer for Face Anti-Spoofing With Statistical Tokens"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7114-8462","authenticated-orcid":false,"given":"Rizhao","family":"Cai","sequence":"first","affiliation":[{"name":"ROSE Laboratory, School of EEE, Nanyang Technological University, Nanyang Avenue, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0422-6616","authenticated-orcid":false,"given":"Zitong","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computing and Information Technology, Great Bay University, Shantou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3958-6489","authenticated-orcid":false,"given":"Chenqi","family":"Kong","sequence":"additional","affiliation":[{"name":"ROSE Laboratory, School of EEE, Nanyang Technological University, Nanyang Avenue, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8723-8112","authenticated-orcid":false,"given":"Haoliang","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, City University of Hong Kong, Kowloon, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4857-6810","authenticated-orcid":false,"given":"Changsheng","family":"Chen","sequence":"additional","affiliation":[{"name":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, the State Key Laboratory of Radio Frequency Heterogeneous Integration, and the College of Electronics and Information Engineering, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7775-3786","authenticated-orcid":false,"given":"Yongjian","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, South China University of Technology, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6262-8125","authenticated-orcid":false,"given":"Alex C.","family":"Kot","sequence":"additional","affiliation":[{"name":"ROSE Laboratory, School of EEE, Nanyang Technological University, Nanyang Avenue, Singapore"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Vision transformer adapter for dense predictions","volume-title":"Proc. ICLR","author":"Chen"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3215850"},{"key":"ref3","article-title":"Digital and physical face attacks: Reviewing and one step further","author":"Kong","year":"2022","journal-title":"arXiv:2209.14692"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3202115"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1561\/116.00000069"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2555286"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2825949"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3026553"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00851"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00409"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6873"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3091167"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3158551"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3036338"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00671"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58523-5_24"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICME52920.2022.9859783"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10095329"},{"key":"ref20","article-title":"An image is worth 16 \u00d7 16 words: Transformers for image recognition at scale","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Dosovitskiy"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484333"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19778-9_3"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01026"},{"key":"ref25","article-title":"Convolutional bypasses are better vision transformer adapters","author":"Jie","year":"2022","journal-title":"arXiv:2207.07039"},{"key":"ref26","article-title":"Learning deep forest with multi-scale local binary pattern features for face anti-spoofing","author":"Cai","year":"2019","journal-title":"arXiv:1910.03850"},{"key":"ref27","first-page":"1","article-title":"On the effectiveness of local binary patterns in face anti-spoofing","volume-title":"Proc. Int. Conf. Biometrics Special Interest Group (BIOSIG)","author":"Chingovska"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15567-3_37"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400395"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2014.211"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IPTA.2016.7821027"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00048"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2985530"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987370"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3065526"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2895212"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICIVC.2017.7984552"},{"key":"ref38","first-page":"3","article-title":"Perturbing convolutional feature maps with histogram of oriented gradients for face liveness detection","volume-title":"Proc. 13th Int. Conf. Complex, Intell., Softw. Intensive Syst. (CISIS)","author":"Rehman"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988168"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2922241"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19775-8_30"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475538"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58529-7_38"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3133620"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3178723"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3188149"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3013214"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2801312"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6866"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3178240"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.08.068"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3044986"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054420"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2019.00167"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916652"},{"key":"ref56","first-page":"2790","article-title":"Parameter-efficient transfer learning for NLP","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Houlsby"},{"key":"ref57","article-title":"LoRA: Low-rank adaptation of large language models","author":"Hu","year":"2021","journal-title":"arXiv:2106.09685"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1007\/978-3-031-19827-4_41","article-title":"Visual prompt tuning","volume-title":"Computer Vision\u2014ECCV 2022: 17th European Conference, Tel Aviv, Israel, October 23\u201327, 2022, Proceedings, Part I","author":"Jia","year":"2022"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3135804"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1603.08155"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199754"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2017.77"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3235581"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00566"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01964"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3547769"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1186\/1687-5281-2014-2"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58571-6_33"},{"key":"ref72","first-page":"1281","article-title":"Dual-cross central difference network for face anti-spoofing","volume-title":"Proc. 30th Int. Joint Conf. Artif. Intell.","author":"Yu"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00481"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00604"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_5"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i2.20099"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10319981\/10577177.pdf?arnumber=10577177","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T17:26:01Z","timestamp":1727112361000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10577177\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":76,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3420699","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}