{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:29Z","timestamp":1750220549806,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,21]],"date-time":"2021-05-21T00:00:00Z","timestamp":1621555200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,21]]},"DOI":"10.1145\/3473258.3473292","type":"proceedings-article","created":{"date-parts":[[2021,12,11]],"date-time":"2021-12-11T21:02:28Z","timestamp":1639256548000},"page":"224-228","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The Shallow Network with Learnable Attention Module For Face Anti-spoofing"],"prefix":"10.1145","author":[{"given":"Yifeng","family":"Ren","sequence":"first","affiliation":[{"name":"Xijing University, China"}]},{"given":"Guigui","family":"Yun","sequence":"additional","affiliation":[{"name":"Beijing University of Chemical Technology, China"}]},{"given":"Qingyan","family":"Li","sequence":"additional","affiliation":[{"name":"Northwestern Polytechnical University, China"}]},{"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[{"name":"Xijing University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,12,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"An Overview of Deep Learning. Deep Learning in Object Detection and Recognition","author":"Xia Z.","year":"2019","unstructured":"Z. Xia . An Overview of Deep Learning. Deep Learning in Object Detection and Recognition . Springer , pp:1-18, 2019 . Z. Xia. An Overview of Deep Learning. Deep Learning in Object Detection and Recognition. Springer, pp:1-18, 2019."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2017.0193"},{"key":"e_1_3_2_1_3_1","first-page":"4249","volume-title":"Generalized face anti-spoofing by detecting pulse from face videos","author":"Li X.","year":"2016","unstructured":"X. Li , J. Komulainen , G. Zhao , P.-C. Yuen , and M. Pietikainen . Generalized face anti-spoofing by detecting pulse from face videos . In International Association for Pattern Recognition . IEEE, pp. 4244\u2013 4249 , 2016 . X. Li, J. Komulainen, G. Zhao, P.-C. Yuen, and M. Pietikainen. Generalized face anti-spoofing by detecting pulse from face videos. In International Association for Pattern Recognition. IEEE, pp. 4244\u20134249, 2016."},{"key":"e_1_3_2_1_4_1","first-page":"1","article-title":"Revisiting Pixel-Wise Supervision for Face Anti-Spoofing","author":"Yu Z.","year":"2021","unstructured":"Z. Yu , X. Li , J. Shi , Z. Xia , G. Zhao . Revisiting Pixel-Wise Supervision for Face Anti-Spoofing . IEEE Transactions on Biometrics, Behavior, And Identity Science , pp. 1 - 11 , 2021 . Z. Yu, X. Li, J. Shi, Z. Xia, G. Zhao. Revisiting Pixel-Wise Supervision for Face Anti-Spoofing. IEEE Transactions on Biometrics, Behavior, And Identity Science, pp.1-11, 2021.","journal-title":"IEEE Transactions on Biometrics, Behavior, And Identity Science"},{"key":"e_1_3_2_1_5_1","volume-title":"IEEE International Conference of the Biometrics Special Interest Group, pp:1-7","author":"Chingovska I.","year":"2012","unstructured":"I. Chingovska , A. Anjos , and S. Marcel . On the effectiveness of local binary patterns in face anti-spoofing . In IEEE International Conference of the Biometrics Special Interest Group, pp:1-7 , 2012 . I. Chingovska, A. Anjos, and S. Marcel. On the effectiveness of local binary patterns in face anti-spoofing. In IEEE International Conference of the Biometrics Special Interest Group, pp:1-7, 2012."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"e_1_3_2_1_7_1","volume-title":"Unsupervised Deep Hashing for Large-Scale Visual Search. International Conference on Image Processing Theory Tools and Applications (IPTA). IEEE, pp:1-5","author":"Xia Z.","year":"2016","unstructured":"Z. Xia , X. Feng , J. Peng , and A. Hadid . Unsupervised Deep Hashing for Large-Scale Visual Search. International Conference on Image Processing Theory Tools and Applications (IPTA). IEEE, pp:1-5 , 2016 . Z. Xia, X. Feng, J. Peng, and A. Hadid. Unsupervised Deep Hashing for Large-Scale Visual Search. International Conference on Image Processing Theory Tools and Applications (IPTA). IEEE, pp:1-5, 2016."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.05.101"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPTA.2018.8608119"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2895212"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.05.017"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3030048"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2019.0155"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01026"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09397-1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.3018222"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00481"},{"volume-title":"Iso\/iec jtc 1\/sc37 biometrics: Information technology biometric presentation attack detection part 1: Framework","year":"2016","key":"e_1_3_2_1_18_1","unstructured":"International organization for standardization , \u201c Iso\/iec jtc 1\/sc37 biometrics: Information technology biometric presentation attack detection part 1: Framework .\u201d in https:\/\/www.iso.org\/obp\/ui\/iso, 2016 . International organization for standardization, \u201cIso\/iec jtc 1\/sc37 biometrics: Information technology biometric presentation attack detection part 1: Framework.\u201d in https:\/\/www.iso.org\/obp\/ui\/iso, 2016."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPTA.2016.7821006"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58523-5_24"}],"event":{"name":"ICBBT '21: 2021 13th International Conference on Bioinformatics and Biomedical Technology","acronym":"ICBBT '21","location":"Xi'an China"},"container-title":["2021 13th International Conference on Bioinformatics and Biomedical Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3473258.3473292","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3473258.3473292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:15Z","timestamp":1750195695000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3473258.3473292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,21]]},"references-count":20,"alternative-id":["10.1145\/3473258.3473292","10.1145\/3473258"],"URL":"https:\/\/doi.org\/10.1145\/3473258.3473292","relation":{},"subject":[],"published":{"date-parts":[[2021,5,21]]},"assertion":[{"value":"2021-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}