{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:21:59Z","timestamp":1771024919009,"version":"3.50.1"},"reference-count":47,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2020,7,26]],"date-time":"2020-07-26T00:00:00Z","timestamp":1595721600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2018AAA0103203"],"award-info":[{"award-number":["2018AAA0103203"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Intell. Syst. Technol."],"published-print":{"date-parts":[[2020,10,31]]},"abstract":"<jats:p>Face anti-spoofing aims to detect presentation attack to face recognition--based authentication systems. It has drawn growing attention due to the high security demand. The widely adopted CNN-based methods usually well recognize the spoofing faces when training and testing spoofing samples display similar patterns, but their performance would drop drastically on testing spoofing faces of novel patterns or unseen scenes, leading to poor generalization performance. Furthermore, almost all current methods treat face anti-spoofing as a prior step to face recognition, which prolongs the response time and makes face authentication inefficient. In this article, we try to boost the generalizability and applicability of face anti-spoofing methods by designing a new generalizable face authentication CNN (GFA-CNN) model with three novelties. First, GFA-CNN introduces a simple yet effective total pairwise confusion loss for CNN training that properly balances contributions of all spoofing patterns for recognizing the spoofing faces. Second, it incorporate a fast domain adaptation component to alleviate negative effects brought by domain variation. Third, it deploys filter diversification learning to make the learned representations more adaptable to new scenes. In addition, the proposed GFA-CNN works in a multi-task manner\u2014it performs face anti-spoofing and face recognition simultaneously. Experimental results on five popular face anti-spoofing and face recognition benchmarks show that GFA-CNN outperforms previous face anti-spoofing methods on cross-test protocols significantly and also well preserves the identity information of input face images.<\/jats:p>","DOI":"10.1145\/3402446","type":"journal-article","created":{"date-parts":[[2020,7,26]],"date-time":"2020-07-26T09:15:25Z","timestamp":1595754925000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":68,"title":["Learning Generalizable and Identity-Discriminative Representations for Face Anti-Spoofing"],"prefix":"10.1145","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1185-5229","authenticated-orcid":false,"given":"Xiaoguang","family":"Tu","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Zheng","family":"Ma","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Jian","family":"Zhao","sequence":"additional","affiliation":[{"name":"Institute of North Electronic Equipment, Beijing, China"}]},{"given":"Guodong","family":"Du","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Mei","family":"Xie","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Jiashi","family":"Feng","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2020,7,26]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201916)","author":"Abadi Mart\u00edn","year":"2016","unstructured":"Mart\u00edn Abadi , Paul Barham , Jianmin Chen , Zhifeng Chen , Andy Davis , Jeffrey Dean , Matthieu Devin , 2016 . TensorFlow: A system for large-scale machine learning . In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201916) . 265--283. Mart\u00edn Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, et al. 2016. TensorFlow: A system for large-scale machine learning. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201916). 265--283."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272758"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2555286"},{"key":"e_1_2_1_5_1","first-page":"141","article-title":"Face antispoofing using speeded-up robust features and fisher vector encoding","volume":"24","author":"Boulkenafet Zinelabidine","year":"2017","unstructured":"Zinelabidine Boulkenafet , Jukka Komulainen , and Abdenour Hadid . 2017 b. Face antispoofing using speeded-up robust features and fisher vector encoding . IEEE Signal Processing Letters 24 , 2 (2017), 141 -- 145 . Zinelabidine Boulkenafet, Jukka Komulainen, and Abdenour Hadid. 2017b. Face antispoofing using speeded-up robust features and fisher vector encoding. IEEE Signal Processing Letters 24, 2 (2017), 141--145.","journal-title":"IEEE Signal Processing Letters"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2018.04.007"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2017.77"},{"key":"e_1_2_1_8_1","article-title":"Stability and generalization","author":"Bousquet Olivier","year":"2002","unstructured":"Olivier Bousquet and Andr\u00e9 Elisseeff . 2002 . Stability and generalization . Journal of Machine Learning Research 2 ( March 2002), 499--526. Olivier Bousquet and Andr\u00e9 Elisseeff. 2002. Stability and generalization. Journal of Machine Learning Research 2 (March 2002), 499--526.","journal-title":"Journal of Machine Learning Research 2"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the 2012 International Conference of the Biometrics Special Interest Group (BIOSIG\u201912)","author":"Chingovska Ivana","year":"2012","unstructured":"Ivana Chingovska , Andr\u00e9 Anjos , and S\u00e9bastien Marcel . 2012 . On the effectiveness of local binary patterns in face anti-spoofing . In Proceedings of the 2012 International Conference of the Biometrics Special Interest Group (BIOSIG\u201912) . IEEE, Los Alamitos, CA, 1--7. Ivana Chingovska, Andr\u00e9 Anjos, and S\u00e9bastien Marcel. 2012. On the effectiveness of local binary patterns in face anti-spoofing. In Proceedings of the 2012 International Conference of the Biometrics Special Interest Group (BIOSIG\u201912). IEEE, Los Alamitos, CA, 1--7."},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the Asian Conference on Computer Vision. 121--132","author":"de Freitas Pereira Tiago","year":"2012","unstructured":"Tiago de Freitas Pereira , Andr\u00e9 Anjos , Jos\u00e9 Mario De Martino , and S\u00e9bastien Marcel . 2012 . LBP- TOP based countermeasure against face spoofing attacks . In Proceedings of the Asian Conference on Computer Vision. 121--132 . Tiago de Freitas Pereira, Andr\u00e9 Anjos, Jos\u00e9 Mario De Martino, and S\u00e9bastien Marcel. 2012. LBP- TOP based countermeasure against face spoofing attacks. In Proceedings of the Asian Conference on Computer Vision. 121--132."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612981"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01258-8_5"},{"key":"e_1_2_1_14_1","volume-title":"Retrieved","author":"Engstrom Logan","year":"2016","unstructured":"Logan Engstrom . 2016 . Fast Style Transfer . Retrieved June 17, 2020 from https:\/\/github.com\/lengstrom\/fast-style-transfer\/. Logan Engstrom. 2016. Fast Style Transfer. Retrieved June 17, 2020 from https:\/\/github.com\/lengstrom\/fast-style-transfer\/."},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA\u201916)","author":"Casey","unstructured":"Casey A. Graff and Jeffrey Ellen. 2016. Correlating filter diversity with convolutional neural network accuracy . In Proceedings of the 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA\u201916) . IEEE, Los Alamitos, CA, 75--80. Casey A. Graff and Jeffrey Ellen. 2016. Correlating filter diversity with convolutional neural network accuracy. In Proceedings of the 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA\u201916). IEEE, Los Alamitos, CA, 75--80."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2018.00096"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the Workshop on Faces in \u2018Real-Life\u2019 Images: Detection, Alignment, and Recognition.","author":"Huang Gary B.","year":"2008","unstructured":"Gary B. Huang , Marwan Mattar , Tamara Berg , and Eric Learned-Miller . 2008 . Labeled faces in the wild: A database for studying face recognition in unconstrained environments . In Proceedings of the Workshop on Faces in \u2018Real-Life\u2019 Images: Detection, Alignment, and Recognition. Gary B. Huang, Marwan Mattar, Tamara Berg, and Eric Learned-Miller. 2008. Labeled faces in the wild: A database for studying face recognition in unconstrained environments. In Proceedings of the Workshop on Faces in \u2018Real-Life\u2019 Images: Detection, Alignment, and Recognition."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46475-6_43"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01261-8_18"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902037"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2825949"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2801312"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the 1st Workshop on Feature Extraction: Modern Questions and Challenges at NIPS 2015 (FE@NIPS\u201915)","author":"Li Yixuan","unstructured":"Yixuan Li , Jason Yosinski , Jeff Clune , Hod Lipson , and John E. Hopcroft . 2015. Convergent learning: Do different neural networks learn the same representations? In Proceedings of the 1st Workshop on Feature Extraction: Modern Questions and Challenges at NIPS 2015 (FE@NIPS\u201915) . 196--212. Yixuan Li, Jason Yosinski, Jeff Clune, Hod Lipson, and John E. Hopcroft. 2015. Convergent learning: Do different neural networks learn the same representations? In Proceedings of the 1st Workshop on Feature Extraction: Modern Questions and Challenges at NIPS 2015 (FE@NIPS\u201915). 196--212."},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the European Conference on Computer Vision (ECCV\u201914)","author":"Lin Tsung-Yi","unstructured":"Tsung-Yi Lin , Michael Maire , Serge Belongie , James Hays , Pietro Perona , Deva Ramanan , Piotr Doll\u00e1r , and C. Lawrence Zitnick . 2014. Microsoft COCO: Common objects in context . In Proceedings of the European Conference on Computer Vision (ECCV\u201914) . 740--755. Tsung-Yi Lin, Michael Maire, Serge Belongie, James Hays, Pietro Perona, Deva Ramanan, Piotr Doll\u00e1r, and C. Lawrence Zitnick. 2014. Microsoft COCO: Common objects in context. In Proceedings of the European Conference on Computer Vision (ECCV\u201914). 740--755."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46478-7_6"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00048"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2007.4409068"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01225-0_29"},{"key":"e_1_2_1_31_1","unstructured":"Alec Radford Luke Metz and Soumith Chintala. 2015. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv:1511.06434.  Alec Radford Luke Metz and Soumith Chintala. 2015. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv:1511.06434."},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the NIPS Workshop on Deep Learning: Bridging Theory and Practice","volume":"1","author":"RoyChowdhury Aruni","year":"2017","unstructured":"Aruni RoyChowdhury , Prakhar Sharma , and Erik Learned-Miller . 2017 . Reducing duplicate filters in deep neural networks . In Proceedings of the NIPS Workshop on Deep Learning: Bridging Theory and Practice , Vol. 1 . Aruni RoyChowdhury, Prakhar Sharma, and Erik Learned-Miller. 2017. Reducing duplicate filters in deep neural networks. In Proceedings of the NIPS Workshop on Deep Learning: Bridging Theory and Practice, Vol. 1."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2018.02.015"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117592"},{"key":"e_1_2_1_35_1","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556.  Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.244"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117522"},{"key":"e_1_2_1_38_1","unstructured":"Xiaoguang Tu Hengsheng Zhang Mei Xie Yao Luo Yuefei Zhang and Zheng Ma. 2019a. Deep transfer across domains for face anti-spoofing. arXiv:1901.05633.  Xiaoguang Tu Hengsheng Zhang Mei Xie Yao Luo Yuefei Zhang and Zheng Ma. 2019a. Deep transfer across domains for face anti-spoofing. arXiv:1901.05633."},{"key":"e_1_2_1_39_1","unstructured":"Xiaoguang Tu Hengsheng Zhang Mei Xie Yao Luo Yuefei Zhang and Zheng Ma. 2019b. Enhance the motion cues for face anti-spoofing using CNN-LSTM architecture. arXiv:1901.05635.  Xiaoguang Tu Hengsheng Zhang Mei Xie Yao Luo Yuefei Zhang and Zheng Ma. 2019b. Enhance the motion cues for face anti-spoofing using CNN-LSTM architecture. arXiv:1901.05635."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987254"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2015.2400395"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACPR.2015.7486482"},{"key":"e_1_2_1_43_1","volume-title":"Li","author":"Yang Jianwei","year":"2014","unstructured":"Jianwei Yang , Zhen Lei , and Stan Z . Li . 2014 . Learn convolutional neural network for face anti-spoofing. arXiv:1408.5601. Jianwei Yang, Zhen Lei, and Stan Z. Li. 2014. Learn convolutional neural network for face anti-spoofing. arXiv:1408.5601."},{"key":"e_1_2_1_44_1","volume-title":"Proceedings of the 2013 International Conference on Biometrics (ICB\u201913)","author":"Yang Jianwei","unstructured":"Jianwei Yang , Zhen Lei , Shengcai Liao , and Stan Z. Li . 2013. Face liveness detection with component dependent descriptor . In Proceedings of the 2013 International Conference on Biometrics (ICB\u201913) . IEEE, Los Alamitos, CA, 1--6. Jianwei Yang, Zhen Lei, Shengcai Liao, and Stan Z. Li. 2013. Face liveness detection with component dependent descriptor. In Proceedings of the 2013 International Conference on Biometrics (ICB\u201913). IEEE, Los Alamitos, CA, 1--6."},{"key":"e_1_2_1_45_1","volume-title":"Proceedings of the 2012 5th IAPR International Conference on Biometrics (ICB\u201912)","author":"Zhang Zhiwei","unstructured":"Zhiwei Zhang , Junjie Yan , Sifei Liu , Zhen Lei , Dong Yi , and Stan Z. Li . 2012. A face antispoofing database with diverse attacks . In Proceedings of the 2012 5th IAPR International Conference on Biometrics (ICB\u201912) . IEEE, Los Alamitos, CA, 26--31. Zhiwei Zhang, Junjie Yan, Sifei Liu, Zhen Lei, Dong Yi, and Stan Z. Li. 2012. A face antispoofing database with diverse attacks. In Proceedings of the 2012 5th IAPR International Conference on Biometrics (ICB\u201912). IEEE, Los Alamitos, CA, 26--31."},{"key":"e_1_2_1_46_1","volume-title":"Jianshu Li, Fang Zhao, Zhecan Wang, Panasonic Sugiri Pranata, Panasonic Shengmei Shen, Shuicheng Yan, and Jiashi Feng.","author":"Zhao Jian","year":"2017","unstructured":"Jian Zhao , Lin Xiong , Panasonic Karlekar Jayashree , Jianshu Li, Fang Zhao, Zhecan Wang, Panasonic Sugiri Pranata, Panasonic Shengmei Shen, Shuicheng Yan, and Jiashi Feng. 2017 . Dual-agent GANs for photorealistic and identity preserving profile face synthesis. In Advances in Neural Information Processing Systems . 66--76. Jian Zhao, Lin Xiong, Panasonic Karlekar Jayashree, Jianshu Li, Fang Zhao, Zhecan Wang, Panasonic Sugiri Pranata, Panasonic Shengmei Shen, Shuicheng Yan, and Jiashi Feng. 2017. Dual-agent GANs for photorealistic and identity preserving profile face synthesis. In Advances in Neural Information Processing Systems. 66--76."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEW.2019.00-88"}],"container-title":["ACM Transactions on Intelligent Systems and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3402446","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3402446","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:34Z","timestamp":1750200094000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3402446"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,26]]},"references-count":47,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,10,31]]}},"alternative-id":["10.1145\/3402446"],"URL":"https:\/\/doi.org\/10.1145\/3402446","relation":{},"ISSN":["2157-6904","2157-6912"],"issn-type":[{"value":"2157-6904","type":"print"},{"value":"2157-6912","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,26]]},"assertion":[{"value":"2019-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-05-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-07-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}