{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T11:44:41Z","timestamp":1762429481297,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Zhejiang Natural Science Foundation","award":["LR19F020006"],"award-info":[{"award-number":["LR19F020006"]}]},{"name":"National Key R&D Program of China","award":["2020YFC0832505"],"award-info":[{"award-number":["2020YFC0832505"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61836002, 62072397"],"award-info":[{"award-number":["61836002, 62072397"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,17]]},"DOI":"10.1145\/3474085.3475284","type":"proceedings-article","created":{"date-parts":[[2021,10,18]],"date-time":"2021-10-18T17:45:27Z","timestamp":1634579127000},"page":"1497-1506","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["VLAD-VSA: Cross-Domain Face Presentation Attack Detection with Vocabulary Separation and Adaptation"],"prefix":"10.1145","author":[{"given":"Jiong","family":"Wang","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Zhou","family":"Zhao","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Weike","family":"Jin","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Xinyu","family":"Duan","sequence":"additional","affiliation":[{"name":"Huawei Cloud, Shenzhen, China"}]},{"given":"Zhen","family":"Lei","sequence":"additional","affiliation":[{"name":"Institute of Automation, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Baoxing","family":"Huai","sequence":"additional","affiliation":[{"name":"Huawei Cloud, Shenzhen, China"}]},{"given":"Yiling","family":"Wu","sequence":"additional","affiliation":[{"name":"Huawei Cloud, Shenzhen, China"}]},{"given":"Xiaofei","family":"He","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2021,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.116"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.572"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.207"},{"key":"e_1_3_2_1_4_1","volume-title":"Aggregating deep convolutional features for image retrieval. arXiv preprint arXiv:1510.07493","author":"Babenko Artem","year":"2015","unstructured":"Artem Babenko and Victor Lempitsky . 2015. Aggregating deep convolutional features for image retrieval. arXiv preprint arXiv:1510.07493 ( 2015 ). Artem Babenko and Victor Lempitsky. 2015. Aggregating deep convolutional features for image retrieval. arXiv preprint arXiv:1510.07493 (2015)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/3326943.3327036"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2555286"},{"key":"e_1_3_2_1_7_1","first-page":"141","article-title":"Face Antispoofing Using Speeded-Up Robust Features and Fisher Vector Encoding","volume":"24","author":"Boulkenafet Zinelabidine","year":"2017","unstructured":"Zinelabidine Boulkenafet , Jukka Komulainen , and Abdenour Hadid . 2017 a. Face Antispoofing Using Speeded-Up Robust Features and Fisher Vector Encoding . IEEE Signal Process. Lett. , Vol. 24 , 2 (2017), 141 -- 145 . Zinelabidine Boulkenafet, Jukka Komulainen, and Abdenour Hadid. 2017a. Face Antispoofing Using Speeded-Up Robust Features and Fisher Vector Encoding. IEEE Signal Process. Lett. , Vol. 24, 2 (2017), 141--145.","journal-title":"IEEE Signal Process. Lett."},{"volume-title":"OULU-NPU: A Mobile Face Presentation Attack Database with Real-World Variations","author":"Boulkenafet Zinelabdine","key":"e_1_3_2_1_8_1","unstructured":"Zinelabdine Boulkenafet , Jukka Komulainen , Lei Li , Xiaoyi Feng , and Abdenour Hadid . 2017b. OULU-NPU: A Mobile Face Presentation Attack Database with Real-World Variations . In FG. IEEE Computer Society , 612--618. Zinelabdine Boulkenafet, Jukka Komulainen, Lei Li, Xiaoyi Feng, and Abdenour Hadid. 2017b. OULU-NPU: A Mobile Face Presentation Attack Database with Real-World Variations. In FG. IEEE Computer Society, 612--618."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/3157096.3157135"},{"key":"e_1_3_2_1_10_1","volume-title":"International Conference of Biometrics Special Interest Group (BIOSIG). 1--7.","author":"Chingovska Ivana","year":"2012","unstructured":"Ivana Chingovska , Andr\u00e9 Anjos , and S\u00e9bastien Marcel . 2012 . On the effectiveness of local binary patterns in face anti-spoofing . In International Conference of Biometrics Special Interest Group (BIOSIG). 1--7. Ivana Chingovska, Andr\u00e9 Anjos, and S\u00e9bastien Marcel. 2012. On the effectiveness of local binary patterns in face anti-spoofing. In International Conference of Biometrics Special Interest Group (BIOSIG). 1--7."},{"key":"e_1_3_2_1_11_1","volume-title":"Frustratingly easy domain adaptation. arXiv preprint arXiv:0907.1815","author":"Hal Daum\u00e9 III.","year":"2009","unstructured":"Hal Daum\u00e9 III. 2009. Frustratingly easy domain adaptation. arXiv preprint arXiv:0907.1815 ( 2009 ). Hal Daum\u00e9 III. 2009. Frustratingly easy domain adaptation. arXiv preprint arXiv:0907.1815 (2009)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612981"},{"key":"e_1_3_2_1_13_1","volume-title":"Abdenour Hadid, Matti Pietik\"ainen, and S\u00e9bastien Marcel.","author":"de Freitas Pereira Tiago","year":"2014","unstructured":"Tiago de Freitas Pereira , Jukka Komulainen , Andr\u00e9 Anjos , Jos\u00e9 Mario De Martino , Abdenour Hadid, Matti Pietik\"ainen, and S\u00e9bastien Marcel. 2014 . Face liveness detection using dynamic texture. EURASIP Journal on Image and Video Processing ( 2014), 2. Tiago de Freitas Pereira, Jukka Komulainen, Andr\u00e9 Anjos, Jos\u00e9 Mario De Martino, Abdenour Hadid, Matti Pietik\"ainen, and S\u00e9bastien Marcel. 2014. Face liveness detection using dynamic texture. EURASIP Journal on Image and Video Processing (2014), 2."},{"key":"e_1_3_2_1_14_1","volume-title":"Unsupervised domain adaptation by backpropagation. arXiv preprint arXiv:1409.7495","author":"Ganin Yaroslav","year":"2014","unstructured":"Yaroslav Ganin and Victor Lempitsky . 2014. Unsupervised domain adaptation by backpropagation. arXiv preprint arXiv:1409.7495 ( 2014 ). Yaroslav Ganin and Victor Lempitsky. 2014. Unsupervised domain adaptation by backpropagation. arXiv preprint arXiv:1409.7495 (2014)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.337"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"volume-title":"Aggregating local descriptors into a compact image representation. In 2010 IEEE computer society conference on computer vision and pattern recognition","author":"J\u00e9gou Herv\u00e9","key":"e_1_3_2_1_17_1","unstructured":"Herv\u00e9 J\u00e9gou , Matthijs Douze , Cordelia Schmid , and Patrick P\u00e9rez . 2010. Aggregating local descriptors into a compact image representation. In 2010 IEEE computer society conference on computer vision and pattern recognition . IEEE , 3304--3311. Herv\u00e9 J\u00e9gou, Matthijs Douze, Cordelia Schmid, and Patrick P\u00e9rez. 2010. Aggregating local descriptors into a compact image representation. In 2010 IEEE computer society conference on computer vision and pattern recognition. IEEE, 3304--3311."},{"volume-title":"Single-Side Domain Generalization for Face Anti-Spoofing","author":"Jia Yunpei","key":"e_1_3_2_1_18_1","unstructured":"Yunpei Jia , Jie Zhang , Shiguang Shan , and Xilin Chen . 2020. Single-Side Domain Generalization for Face Anti-Spoofing . In CVPR. IEEE , 8481--8490. Yunpei Jia, Jie Zhang, Shiguang Shan, and Xilin Chen. 2020. Single-Side Domain Generalization for Face Anti-Spoofing. In CVPR. IEEE, 8481--8490."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01261-8_18"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"H J\u00e9gou M. Douze and C. Schmid. 2009. On the burstiness of visual elements. IEEE CVPR (2009).  H J\u00e9gou M. Douze and C. Schmid. 2009. On the burstiness of visual elements. IEEE CVPR (2009).","DOI":"10.1109\/CVPR.2009.5206609"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33718-5_12"},{"key":"e_1_3_2_1_22_1","volume-title":"Hospedales","author":"Li Da","year":"2017","unstructured":"Da Li , Yongxin Yang , Yi-Zhe Song , and Timothy M . Hospedales . 2017 . Deeper, Broader and Artier Domain Generalization. In ICCV. IEEE Computer Society , 5543--5551. Da Li, Yongxin Yang, Yi-Zhe Song, and Timothy M. Hospedales. 2017. Deeper, Broader and Artier Domain Generalization. In ICCV. IEEE Computer Society, 5543--5551."},{"key":"e_1_3_2_1_23_1","volume-title":"Unsupervised domain adaptation for face anti-spoofing. Transactions on Information Forensics and Security (TIFS)","author":"Li Haoliang","year":"2018","unstructured":"Haoliang Li , Wen Li , Hong Cao , Shiqi Wang , Feiyue Huang , and Alex C Kot . 2018a. Unsupervised domain adaptation for face anti-spoofing. Transactions on Information Forensics and Security (TIFS) ( 2018 ), 1794--1809. Haoliang Li, Wen Li, Hong Cao, Shiqi Wang, Feiyue Huang, and Alex C Kot. 2018a. Unsupervised domain adaptation for face anti-spoofing. Transactions on Information Forensics and Security (TIFS) (2018), 1794--1809."},{"key":"e_1_3_2_1_24_1","volume-title":"Kot","author":"Li Haoliang","year":"2018","unstructured":"Haoliang Li , Wen Li , Hong Cao , Shiqi Wang , Feiyue Huang , and Alex C . Kot . 2018 b. Unsupervised Domain Adaptation for Face Anti-Spoofing. IEEE Transactions on Information Forensics and Security ( 2018), 1--1. Haoliang Li, Wen Li, Hong Cao, Shiqi Wang, Feiyue Huang, and Alex C. Kot. 2018b. Unsupervised Domain Adaptation for Face Anti-Spoofing. IEEE Transactions on Information Forensics and Security (2018), 1--1."},{"key":"e_1_3_2_1_25_1","volume-title":"Shiqi Wang, and Alex C. Kot.","author":"Li Haoliang","year":"2018","unstructured":"Haoliang Li , Sinno Jialin Pan , Shiqi Wang, and Alex C. Kot. 2018 c. Domain Generalization With Adversarial Feature Learning. In CVPR. IEEE Computer Society , 5400--5409. Haoliang Li, Sinno Jialin Pan, Shiqi Wang, and Alex C. Kot. 2018c. Domain Generalization With Adversarial Feature Learning. In CVPR. IEEE Computer Society, 5400--5409."},{"volume-title":"ECCV (7) (Lecture Notes in Computer Science)","author":"Liu Siqi","key":"e_1_3_2_1_26_1","unstructured":"Siqi Liu , Pong C. Yuen , Shengping Zhang , and Guoying Zhao . 2016. 3D Mask Face Anti-spoofing with Remote Photoplethysmography . In ECCV (7) (Lecture Notes in Computer Science) , Vol. 9911 . Springer , 85--100. Siqi Liu, Pong C. Yuen, Shengping Zhang, and Guoying Zhao. 2016. 3D Mask Face Anti-spoofing with Remote Photoplethysmography. In ECCV (7) (Lecture Notes in Computer Science), Vol. 9911. Springer, 85--100."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00048"},{"volume-title":"Learning Deep Models for Face Anti-Spoofing: Binary or Auxiliary Supervision","author":"Liu Yaojie","key":"e_1_3_2_1_28_1","unstructured":"Yaojie Liu , Amin Jourabloo , and Xiaoming Liu . 2018b. Learning Deep Models for Face Anti-Spoofing: Binary or Auxiliary Supervision . In CVPR. IEEE Computer Society , 389--398. Yaojie Liu, Amin Jourabloo, and Xiaoming Liu. 2018b. Learning Deep Models for Face Anti-Spoofing: Binary or Auxiliary Supervision. In CVPR. IEEE Computer Society, 389--398."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00481"},{"key":"e_1_3_2_1_30_1","volume-title":"On Disentangling Spoof Trace for Generic Face Anti-Spoofing. In European Conference on Computer Vision. Springer, 406--422","author":"Liu Yaojie","year":"2020","unstructured":"Yaojie Liu , Joel Stehouwer , and Xiaoming Liu . 2020 . On Disentangling Spoof Trace for Generic Face Anti-Spoofing. In European Conference on Computer Vision. Springer, 406--422 . Yaojie Liu, Joel Stehouwer, and Xiaoming Liu. 2020. On Disentangling Spoof Trace for Generic Face Anti-Spoofing. In European Conference on Computer Vision. Springer, 406--422."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/3045118.3045130"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.609"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/3042817.3042820"},{"key":"e_1_3_2_1_36_1","volume-title":"Your face is NOT your password. BlackHat DC","author":"Nguyen Duc","year":"2009","unstructured":"Duc Nguyen and QM Bui . 2009. Your face is NOT your password. BlackHat DC ( 2009 ). Duc Nguyen and QM Bui. 2009. Your face is NOT your password. BlackHat DC (2009)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46654-5_67"},{"key":"e_1_3_2_1_38_1","volume-title":"International Conference on Machine Learning. PMLR, 7728--7738","author":"Piratla Vihari","year":"2020","unstructured":"Vihari Piratla , Praneeth Netrapalli , and Sunita Sarawagi . 2020 . Efficient domain generalization via common-specific low-rank decomposition . In International Conference on Machine Learning. PMLR, 7728--7738 . Vihari Piratla, Praneeth Netrapalli, and Sunita Sarawagi. 2020. Efficient domain generalization via common-specific low-rank decomposition. In International Conference on Machine Learning. PMLR, 7728--7738."},{"key":"e_1_3_2_1_39_1","volume-title":"Learning Meta Model for Zero-and Few-shot Face Anti-spoofing. arXiv preprint arXiv:1904.12490","author":"Qin Yunxiao","year":"2019","unstructured":"Yunxiao Qin , Chenxu Zhao , Xiangyu Zhu , Zezheng Wang , Zitong Yu , Tianyu Fu , Feng Zhou , Jingping Shi , and Zhen Lei . 2019. Learning Meta Model for Zero-and Few-shot Face Anti-spoofing. arXiv preprint arXiv:1904.12490 ( 2019 ). Yunxiao Qin, Chenxu Zhao, Xiangyu Zhu, Zezheng Wang, Zitong Yu, Tianyu Fu, Feng Zhou, Jingping Shi, and Zhen Lei. 2019. Learning Meta Model for Zero-and Few-shot Face Anti-spoofing. arXiv preprint arXiv:1904.12490 (2019)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-013-0636-x"},{"key":"e_1_3_2_1_41_1","unstructured":"Shiv Shankar Vihari Piratla Soumen Chakrabarti Siddhartha Chaudhuri Preethi Jyothi and Sunita Sarawagi. 2018. Generalizing Across Domains via Cross-Gradient Training. In ICLR (Poster) . OpenReview.net.  Shiv Shankar Vihari Piratla Soumen Chakrabarti Siddhartha Chaudhuri Preethi Jyothi and Sunita Sarawagi. 2018. Generalizing Across Domains via Cross-Gradient Training. In ICLR (Poster) . OpenReview.net."},{"key":"e_1_3_2_1_42_1","volume-title":"Multi-Adversarial Discriminative Deep Domain Generalization for Face Presentation Attack Detection. In Conference on Computer Vision and Pattern Recognition (CVPR). 10023--10031","author":"Shao Rui","year":"2019","unstructured":"Rui Shao , Xiangyuan Lan , Jiawei Li , and Pong C Yuen . 2019 c . Multi-Adversarial Discriminative Deep Domain Generalization for Face Presentation Attack Detection. In Conference on Computer Vision and Pattern Recognition (CVPR). 10023--10031 . Rui Shao, Xiangyuan Lan, Jiawei Li, and Pong C Yuen. 2019 c. Multi-Adversarial Discriminative Deep Domain Generalization for Face Presentation Attack Detection. In Conference on Computer Vision and Pattern Recognition (CVPR). 10023--10031."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2868230"},{"key":"e_1_3_2_1_44_1","volume-title":"2019 b. Regularized Fine-grained Meta Face Anti-spoofing. arXiv preprint arXiv:1911.10771","author":"Shao Rui","year":"2019","unstructured":"Rui Shao , Xiangyuan Lan , and Pong C Yuen . 2019 b. Regularized Fine-grained Meta Face Anti-spoofing. arXiv preprint arXiv:1911.10771 ( 2019 ). Rui Shao, Xiangyuan Lan, and Pong C Yuen. 2019 b. Regularized Fine-grained Meta Face Anti-spoofing. arXiv preprint arXiv:1911.10771 (2019)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/946247.946751"},{"key":"e_1_3_2_1_46_1","volume-title":"IEEE","author":"Stylianou Abby","year":"2019","unstructured":"Abby Stylianou , Richard Souvenir , and Robert Pless . 2019 . Visualizing deep similarity networks. In 2019 IEEE winter conference on applications of computer vision (WACV) . IEEE , 2029--2037. Abby Stylianou, Richard Souvenir, and Robert Pless. 2019. Visualizing deep similarity networks. In 2019 IEEE winter conference on applications of computer vision (WACV). IEEE, 2029--2037."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/1888212.1888251"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.177"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/3327345.3327439"},{"volume-title":"2020 a. Cross-Domain Face Presentation Attack Detection via Multi-Domain Disentangled Representation Learning","author":"Wang Guoqing","key":"e_1_3_2_1_50_1","unstructured":"Guoqing Wang , Hu Han , Shiguang Shan , and Xilin Chen . 2020 a. Cross-Domain Face Presentation Attack Detection via Multi-Domain Disentangled Representation Learning . In CVPR. IEEE , 6677--6686. Guoqing Wang, Hu Han, Shiguang Shan, and Xilin Chen. 2020 a. Cross-Domain Face Presentation Attack Detection via Multi-Domain Disentangled Representation Learning. In CVPR. IEEE , 6677--6686."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3002390"},{"volume-title":"2020 b. Deep Spatial Gradient and Temporal Depth Learning for Face Anti-Spoofing","author":"Wang Zezheng","key":"e_1_3_2_1_52_1","unstructured":"Zezheng Wang , Zitong Yu , Chenxu Zhao , Xiangyu Zhu , Yunxiao Qin , Qiusheng Zhou , Feng Zhou , and Zhen Lei . 2020 b. Deep Spatial Gradient and Temporal Depth Learning for Face Anti-Spoofing . In CVPR. IEEE , 5041--5050. Zezheng Wang, Zitong Yu, Chenxu Zhao, Xiangyu Zhu, Yunxiao Qin, Qiusheng Zhou, Feng Zhou, and Zhen Lei. 2020 b. Deep Spatial Gradient and Temporal Depth Learning for Face Anti-Spoofing. In CVPR. IEEE, 5041--5050."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400395"},{"key":"e_1_3_2_1_54_1","volume-title":"Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601","author":"Yang Jianwei","year":"2014","unstructured":"Jianwei Yang , Zhen Lei , and Stan Z Li. 2014. Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601 ( 2014 ). Jianwei Yang, Zhen Lei, and Stan Z Li. 2014. Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601 (2014)."},{"volume-title":"Searching Central Difference Convolutional Networks for Face Anti-Spoofing","author":"Yu Zitong","key":"e_1_3_2_1_55_1","unstructured":"Zitong Yu , Chenxu Zhao , Zezheng Wang , Yunxiao Qin , Zhuo Su , Xiaobai Li , Feng Zhou , and Guoying Zhao . 2020. Searching Central Difference Convolutional Networks for Face Anti-Spoofing . In CVPR. IEEE , 5294--5304. Zitong Yu, Chenxu Zhao, Zezheng Wang, Yunxiao Qin, Zhuo Su, Xiaobai Li, Feng Zhou, and Guoying Zhao. 2020. Searching Central Difference Convolutional Networks for Face Anti-Spoofing. In CVPR. IEEE, 5294--5304."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58529-7_38"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Shifeng Zhang Xiaobo Wang Ajian Liu Chenxu Zhao Jun Wan Sergio Escalera Hailin Shi Zezheng Wang and Stan Z Li. 2019. A dataset and benchmark for large-scale multi-modal face anti-spoofing. In CVPR . 919--928.  Shifeng Zhang Xiaobo Wang Ajian Liu Chenxu Zhao Jun Wan Sergio Escalera Hailin Shi Zezheng Wang and Stan Z Li. 2019. A dataset and benchmark for large-scale multi-modal face anti-spoofing. In CVPR . 919--928.","DOI":"10.1109\/CVPR.2019.00101"},{"key":"e_1_3_2_1_58_1","volume-title":"International Conference on Biometrics (ICB)","author":"Zhang Zhiwei","year":"2012","unstructured":"Zhiwei Zhang , Junjie Yan , Sifei Liu , Zhen Lei , Yangtao Dong , and Stan Z. Li . 2012. A face antispoofing database with diverse attacks . International Conference on Biometrics (ICB) ( 2012 ), 26--31. Zhiwei Zhang, Junjie Yan, Sifei Liu, Zhen Lei, Yangtao Dong, and Stan Z. Li. 2012. A face antispoofing database with diverse attacks. International Conference on Biometrics (ICB) (2012), 26--31."},{"key":"e_1_3_2_1_59_1","volume-title":"Asian Conference on Computer Vision. Springer, 35--50","author":"Zhong Yujie","year":"2018","unstructured":"Yujie Zhong , Relja Arandjelovi\u0107 , and Andrew Zisserman . 2018 . Ghostvlad for set-based face recognition . In Asian Conference on Computer Vision. Springer, 35--50 . Yujie Zhong, Relja Arandjelovi\u0107, and Andrew Zisserman. 2018. Ghostvlad for set-based face recognition. In Asian Conference on Computer Vision. Springer, 35--50."}],"event":{"name":"MM '21: ACM Multimedia Conference","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Virtual Event China","acronym":"MM '21"},"container-title":["Proceedings of the 29th ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474085.3475284","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474085.3475284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:17Z","timestamp":1750193297000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474085.3475284"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,17]]},"references-count":59,"alternative-id":["10.1145\/3474085.3475284","10.1145\/3474085"],"URL":"https:\/\/doi.org\/10.1145\/3474085.3475284","relation":{},"subject":[],"published":{"date-parts":[[2021,10,17]]},"assertion":[{"value":"2021-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}