{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T17:10:38Z","timestamp":1771953038794,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CCF-Baidu Open Fund","award":["2021PP15002000"],"award-info":[{"award-number":["2021PP15002000"]}]},{"name":"Guangdong Basic and Applied Basic Research Foundation","award":["2021B1515140013"],"award-info":[{"award-number":["2021B1515140013"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62176042 and 62073059"],"award-info":[{"award-number":["62176042 and 62073059"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CCF-Tencent Open Fund","award":["RAGR20210107"],"award-info":[{"award-number":["RAGR20210107"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3503161.3548073","type":"proceedings-article","created":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T15:42:46Z","timestamp":1665416566000},"page":"1749-1757","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Energy-Based Domain Generalization for Face Anti-Spoofing"],"prefix":"10.1145","author":[{"given":"Zhekai","family":"Du","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Jingjing","family":"Li","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China &amp; Institute of Electronic and Information Engineering of UESTC in Guangdong, Chengdu, China"}]},{"given":"Lin","family":"Zuo","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Lei","family":"Zhu","sequence":"additional","affiliation":[{"name":"Shandong Normal University, Jinan, China"}]},{"given":"Ke","family":"Lu","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"320","published-online":{"date-parts":[[2022,10,10]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Face antispoofing using patch and depth-based CNNs","author":"Atoum Yousef","unstructured":"Yousef Atoum , Yaojie Liu , Amin Jourabloo , and Xiaoming Liu . 2017. Face antispoofing using patch and depth-based CNNs . In IJCB. IEEE , 319--328. Yousef Atoum, Yaojie Liu, Amin Jourabloo, and Xiaoming Liu. 2017. Face antispoofing using patch and depth-based CNNs. In IJCB. IEEE, 319--328."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Zinelabidine Boulkenafet Jukka Komulainen and Abdenour Hadid. 2015. Face anti-spoofing based on color texture analysis. In ICIP. 2636--2640. Zinelabidine Boulkenafet Jukka Komulainen and Abdenour Hadid. 2015. Face anti-spoofing based on color texture analysis. In ICIP. 2636--2640.","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"e_1_3_2_2_3_1","first-page":"1818","article-title":"Face spoofing detection using colour texture analysis","volume":"11","author":"Boulkenafet Zinelabidine","year":"2016","unstructured":"Zinelabidine Boulkenafet , Jukka Komulainen , and Abdenour Hadid . 2016 . Face spoofing detection using colour texture analysis . TIFS 11 , 8 (2016), 1818 -- 1830 . Zinelabidine Boulkenafet, Jukka Komulainen, and Abdenour Hadid. 2016. Face spoofing detection using colour texture analysis. TIFS 11, 8 (2016), 1818--1830.","journal-title":"TIFS"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2017.77"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Zhihong Chen Taiping Yao Kekai Sheng Shouhong Ding Ying Tai Jilin Li Feiyue Huang and Xinyu Jin. 2021. Generalizable representation learning for mixture domain face anti-spoofing. In AAAI. Zhihong Chen Taiping Yao Kekai Sheng Shouhong Ding Ying Tai Jilin Li Feiyue Huang and Xinyu Jin. 2021. Generalizable representation learning for mixture domain face anti-spoofing. In AAAI.","DOI":"10.1609\/aaai.v35i2.16199"},{"key":"e_1_3_2_2_6_1","volume-title":"On the effectiveness of local binary patterns in face anti-spoofing","author":"Chingovska Ivana","unstructured":"Ivana Chingovska , Andr\u00e9 Anjos , and S\u00e9bastien Marcel . 2012. On the effectiveness of local binary patterns in face anti-spoofing . In BIOSIG. IEEE , 1--7. Ivana Chingovska, Andr\u00e9 Anjos, and S\u00e9bastien Marcel. 2012. On the effectiveness of local binary patterns in face anti-spoofing. In BIOSIG. IEEE, 1--7."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2940693"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Xin Dong Hao Liu Weiwei Cai Pengyuan Lv and Zekuan Yu. 2021. Open Set Face Anti-Spoofing in Unseen Attacks. In ACMMM. 4082--4090. Xin Dong Hao Liu Weiwei Cai Pengyuan Lv and Zekuan Yu. 2021. Open Set Face Anti-Spoofing in Unseen Attacks. In ACMMM. 4082--4090.","DOI":"10.1145\/3474085.3475538"},{"key":"e_1_3_2_2_9_1","volume-title":"Generating images with perceptual similarity metrics based on deep networks. NIPS 29","author":"Dosovitskiy Alexey","year":"2016","unstructured":"Alexey Dosovitskiy and Thomas Brox . 2016. Generating images with perceptual similarity metrics based on deep networks. NIPS 29 ( 2016 ). Alexey Dosovitskiy and Thomas Brox. 2016. Generating images with perceptual similarity metrics based on deep networks. NIPS 29 (2016)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475488"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00393"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Yao Feng Fan Wu Xiaohu Shao Yanfeng Wang and Xi Zhou. 2018. Joint 3d face reconstruction and dense alignment with position map regression network. In ECCV. 534--551. Yao Feng Fan Wu Xiaohu Shao Yanfeng Wang and Xi Zhou. 2018. Joint 3d face reconstruction and dense alignment with position map regression network. In ECCV. 534--551.","DOI":"10.1007\/978-3-030-01264-9_33"},{"key":"e_1_3_2_2_13_1","unstructured":"Chelsea Finn Pieter Abbeel and Sergey Levine. 2017. Model-agnostic metalearning for fast adaptation of deep networks. In ICML. PMLR 1126--1135. Chelsea Finn Pieter Abbeel and Sergey Levine. 2017. Model-agnostic metalearning for fast adaptation of deep networks. In ICML. PMLR 1126--1135."},{"key":"e_1_3_2_2_14_1","volume-title":"Jos\u00e9 Mario De Martino, and S\u00e9bastien Marcel","author":"de Freitas Pereira Tiago","year":"2012","unstructured":"Tiago de Freitas Pereira , Andr\u00e9 Anjos , Jos\u00e9 Mario De Martino, and S\u00e9bastien Marcel . 2012 . LBP- TOP based countermeasure against face spoofing attacks. In ACCV. 121--132. Tiago de Freitas Pereira, Andr\u00e9 Anjos, Jos\u00e9 Mario De Martino, and S\u00e9bastien Marcel. 2012. LBP- TOP based countermeasure against face spoofing attacks. In ACCV. 121--132."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-5281-2014-2"},{"key":"e_1_3_2_2_16_1","unstructured":"Will Grathwohl Kuan-Chieh Wang J\u00f6rn-Henrik Jacobsen David Duvenaud Mohammad Norouzi and Kevin Swersky. 2019. Your classifier is secretly an energy based model and you should treat it like one. ICLR. Will Grathwohl Kuan-Chieh Wang J\u00f6rn-Henrik Jacobsen David Duvenaud Mohammad Norouzi and Kevin Swersky. 2019. Your classifier is secretly an energy based model and you should treat it like one. ICLR."},{"key":"e_1_3_2_2_17_1","volume-title":"A compact deep learning model for face spoofing detection. arXiv preprint arXiv:2101.04756","author":"Hashemifard Seyedkooshan","year":"2021","unstructured":"Seyedkooshan Hashemifard and Mohammad Akbari . 2021. A compact deep learning model for face spoofing detection. arXiv preprint arXiv:2101.04756 ( 2021 ). Seyedkooshan Hashemifard and Mohammad Akbari. 2021. A compact deep learning model for face spoofing detection. arXiv preprint arXiv:2101.04756 (2021)."},{"key":"e_1_3_2_2_18_1","unstructured":"Yunpei Jia Jie Zhang Shiguang Shan and Xilin Chen. 2020. Single-side domain generalization for face anti-spoofing. In CVPR. 8484--8493. Yunpei Jia Jie Zhang Shiguang Shan and Xilin Chen. 2020. Single-side domain generalization for face anti-spoofing. In CVPR. 8484--8493."},{"key":"e_1_3_2_2_19_1","volume-title":"Perceptual losses for real-time style transfer and super-resolution","author":"Johnson Justin","unstructured":"Justin Johnson , Alexandre Alahi , and Li Fei-Fei . 2016. Perceptual losses for real-time style transfer and super-resolution . In ECCV. Springer , 694--711. Justin Johnson, Alexandre Alahi, and Li Fei-Fei. 2016. Perceptual losses for real-time style transfer and super-resolution. In ECCV. Springer, 694--711."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Jukka Komulainen Abdenour Hadid and Matti Pietik\u00e4inen. 2013. Context based face anti-spoofing. In BTAS. 1--8. Jukka Komulainen Abdenour Hadid and Matti Pietik\u00e4inen. 2013. Context based face anti-spoofing. In BTAS. 1--8.","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"Huafeng Kuang Rongrong Ji Hong Liu Shengchuan Zhang Xiaoshuai Sun Feiyue Huang and Baochang Zhang. 2019. Multi-modal multi-layer fusion network with average binary center loss for face anti-spoofing. In ACMMM. 48--56. Huafeng Kuang Rongrong Ji Hong Liu Shengchuan Zhang Xiaoshuai Sun Feiyue Huang and Baochang Zhang. 2019. Multi-modal multi-layer fusion network with average binary center loss for face anti-spoofing. In ACMMM. 48--56.","DOI":"10.1145\/3343031.3351001"},{"key":"e_1_3_2_2_22_1","volume-title":"A tutorial on energy-based learning. Predicting structured data 1, 0","author":"LeCun Yann","year":"2006","unstructured":"Yann LeCun , Sumit Chopra , Raia Hadsell , M Ranzato , and F Huang . 2006. A tutorial on energy-based learning. Predicting structured data 1, 0 ( 2006 ). Yann LeCun, Sumit Chopra, Raia Hadsell, M Ranzato, and F Huang. 2006. A tutorial on energy-based learning. Predicting structured data 1, 0 (2006)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Da Li Yongxin Yang Yi-Zhe Song and Timothy M Hospedales. 2017. Deeper broader and artier domain generalization. In CVPR. 5542--5550. Da Li Yongxin Yang Yi-Zhe Song and Timothy M Hospedales. 2017. Deeper broader and artier domain generalization. In CVPR. 5542--5550.","DOI":"10.1109\/ICCV.2017.591"},{"key":"e_1_3_2_2_24_1","volume-title":"Shiqi Wang, and Alex C Kot.","author":"Li Haoliang","year":"2018","unstructured":"Haoliang Li , Sinno Jialin Pan , Shiqi Wang, and Alex C Kot. 2018 . Domain generalization with adversarial feature learning. In CVPR. 5400--5409. Haoliang Li, Sinno Jialin Pan, Shiqi Wang, and Alex C Kot. 2018. Domain generalization with adversarial feature learning. In CVPR. 5400--5409."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2991050"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3109287"},{"key":"e_1_3_2_2_27_1","volume-title":"Transfer independently together: A generalized framework for domain adaptation","author":"Li Jingjing","year":"2018","unstructured":"Jingjing Li , Ke Lu , Zi Huang , Lei Zhu , and Heng Tao Shen . 2018. Transfer independently together: A generalized framework for domain adaptation . IEEE transactions on cybernetics 49, 6 ( 2018 ), 2144--2155. Jingjing Li, Ke Lu, Zi Huang, Lei Zhu, and Heng Tao Shen. 2018. Transfer independently together: A generalized framework for domain adaptation. IEEE transactions on cybernetics 49, 6 (2018), 2144--2155."},{"key":"e_1_3_2_2_28_1","volume-title":"An original face anti-spoofing approach using partial convolutional neural network","author":"Li Lei","unstructured":"Lei Li , Xiaoyi Feng , Zinelabidine Boulkenafet , Zhaoqiang Xia , Mingming Li , and Abdenour Hadid . 2016. An original face anti-spoofing approach using partial convolutional neural network . In IPTA. IEEE , 1--6. Lei Li, Xiaoyi Feng, Zinelabidine Boulkenafet, Zhaoqiang Xia, Mingming Li, and Abdenour Hadid. 2016. An original face anti-spoofing approach using partial convolutional neural network. In IPTA. IEEE, 1--6."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Sheng Li Xun Zhu Guorui Feng Xinpeng Zhang and Zhenxing Qian. 2021. Diffusing the Liveness Cues for Face Anti-spoofing. In ACMMM. 1636--1644. Sheng Li Xun Zhu Guorui Feng Xinpeng Zhang and Zhenxing Qian. 2021. Diffusing the Liveness Cues for Face Anti-spoofing. In ACMMM. 1636--1644.","DOI":"10.1145\/3474085.3475305"},{"key":"e_1_3_2_2_30_1","unstructured":"Shubao Liu Ke-Yue Zhang Taiping Yao Mingwei Bi Shouhong Ding Jilin Li Feiyue Huang and Lizhuang Ma. 2021. Adaptive normalized representation learning for generalizable face anti-spoofing. In ACMMM. 1469--1477. Shubao Liu Ke-Yue Zhang Taiping Yao Mingwei Bi Shouhong Ding Jilin Li Feiyue Huang and Lizhuang Ma. 2021. Adaptive normalized representation learning for generalizable face anti-spoofing. In ACMMM. 1469--1477."},{"key":"e_1_3_2_2_31_1","first-page":"21464","article-title":"Energy-based out-of-distribution detection","volume":"33","author":"Liu Weitang","year":"2020","unstructured":"Weitang Liu , Xiaoyun Wang , John Owens , and Yixuan Li . 2020 . Energy-based out-of-distribution detection . NIPS 33 , 21464 -- 21475 . Weitang Liu, Xiaoyun Wang, John Owens, and Yixuan Li. 2020. Energy-based out-of-distribution detection. NIPS 33, 21464--21475.","journal-title":"NIPS"},{"key":"e_1_3_2_2_32_1","unstructured":"Yaojie Liu Amin Jourabloo and Xiaoming Liu. 2018. Learning deep models for face anti-spoofing: Binary or auxiliary supervision. In CVPR. 389--398. Yaojie Liu Amin Jourabloo and Xiaoming Liu. 2018. Learning deep models for face anti-spoofing: Binary or auxiliary supervision. In CVPR. 389--398."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331217"},{"key":"e_1_3_2_2_34_1","volume-title":"Face spoofing detection from single images using micro-texture analysis","author":"M\u00e4\u00e4tt\u00e4 Jukka","unstructured":"Jukka M\u00e4\u00e4tt\u00e4 , Abdenour Hadid , and Matti Pietik\u00e4inen . 2011. Face spoofing detection from single images using micro-texture analysis . In IJCB. IEEE , 1--7. Jukka M\u00e4\u00e4tt\u00e4, Abdenour Hadid, and Matti Pietik\u00e4inen. 2011. Face spoofing detection from single images using micro-texture analysis. In IJCB. IEEE, 1--7."},{"key":"e_1_3_2_2_35_1","first-page":"2268","article-title":"Secure face unlock: Spoof detection on smartphones","volume":"11","author":"Patel Keyurkumar","year":"2016","unstructured":"Keyurkumar Patel , Hu Han , and Anil K Jain . 2016 . Secure face unlock: Spoof detection on smartphones . TIFS 11 , 10 (2016), 2268 -- 2283 . Keyurkumar Patel, Hu Han, and Anil K Jain. 2016. Secure face unlock: Spoof detection on smartphones. TIFS 11, 10 (2016), 2268--2283.","journal-title":"TIFS"},{"key":"e_1_3_2_2_36_1","volume-title":"Face liveness detection under bad illumination conditions","author":"Peixoto Bruno","unstructured":"Bruno Peixoto , Carolina Michelassi , and Anderson Rocha . 2011. Face liveness detection under bad illumination conditions . In ICIP. IEEE , 3557--3560. Bruno Peixoto, Carolina Michelassi, and Anderson Rocha. 2011. Face liveness detection under bad illumination conditions. In ICIP. IEEE, 3557--3560."},{"key":"e_1_3_2_2_37_1","unstructured":"Xingchao Peng Zijun Huang Ximeng Sun and Kate Saenko. 2019. Domain agnostic learning with disentangled representations. In ICML. PMLR 5102--5112. Xingchao Peng Zijun Huang Ximeng Sun and Kate Saenko. 2019. Domain agnostic learning with disentangled representations. In ICML. PMLR 5102--5112."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"Fengchun Qiao Long Zhao and Xi Peng. 2020. Learning to learn single domain generalization. In CVPR. 12556--12565. Fengchun Qiao Long Zhao and Xi Peng. 2020. Learning to learn single domain generalization. In CVPR. 12556--12565.","DOI":"10.1109\/CVPR42600.2020.01257"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"crossref","unstructured":"Rui Shao Xiangyuan Lan Jiawei Li and Pong C Yuen. 2019. Multi-adversarial discriminative deep domain generalization for face presentation attack detection. In CVPR. 10023--10031. Rui Shao Xiangyuan Lan Jiawei Li and Pong C Yuen. 2019. Multi-adversarial discriminative deep domain generalization for face presentation attack detection. In CVPR. 10023--10031.","DOI":"10.1109\/CVPR.2019.01026"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"crossref","unstructured":"Rui Shao Xiangyuan Lan and Pong C Yuen. 2020. Regularized fine-grained meta face anti-spoofing. In AAAI. 11974--11981. Rui Shao Xiangyuan Lan and Pong C Yuen. 2020. Regularized fine-grained meta face anti-spoofing. In AAAI. 11974--11981.","DOI":"10.1609\/aaai.v34i07.6873"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_27"},{"key":"e_1_3_2_2_42_1","volume-title":"Face liveness detection from a single image with sparse low rank bilinear discriminative model","author":"Tan Xiaoyang","unstructured":"Xiaoyang Tan , Yi Li , Jun Liu , and Lin Jiang . 2010. Face liveness detection from a single image with sparse low rank bilinear discriminative model . In ECCV. Springer , 504--517. Xiaoyang Tan, Yi Li, Jun Liu, and Lin Jiang. 2010. Face liveness detection from a single image with sparse low rank bilinear discriminative model. In ECCV. Springer, 504--517."},{"key":"e_1_3_2_2_43_1","article-title":"Visualizing data using t-SNE","volume":"9","author":"der Maaten Laurens Van","year":"2008","unstructured":"Laurens Van der Maaten and Geoffrey Hinton . 2008 . Visualizing data using t-SNE . Journal of machine learning research 9 , 11 (2008). Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research 9, 11 (2008).","journal-title":"Journal of machine learning research"},{"key":"e_1_3_2_2_44_1","volume-title":"Generalizing to unseen domains via adversarial data augmentation. NIPS 31","author":"Volpi Riccardo","year":"2018","unstructured":"Riccardo Volpi , Hongseok Namkoong , Ozan Sener , John C Duchi , Vittorio Murino , and Silvio Savarese . 2018. Generalizing to unseen domains via adversarial data augmentation. NIPS 31 ( 2018 ). Riccardo Volpi, Hongseok Namkoong, Ozan Sener, John C Duchi, Vittorio Murino, and Silvio Savarese. 2018. Generalizing to unseen domains via adversarial data augmentation. NIPS 31 (2018)."},{"key":"e_1_3_2_2_45_1","unstructured":"Weitao Wan Yuanyi Zhong Tianpeng Li and Jiansheng Chen. 2018. Rethinking feature distribution for loss functions in image classification. In CVPR. 9117--9126. Weitao Wan Yuanyi Zhong Tianpeng Li and Jiansheng Chen. 2018. Rethinking feature distribution for loss functions in image classification. In CVPR. 9117--9126."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"crossref","unstructured":"Guoqing Wang Hu Han Shiguang Shan and Xilin Chen. 2020. Cross-domain face presentation attack detection via multi-domain disentangled representation learning. In CVPR. 6678--6687. Guoqing Wang Hu Han Shiguang Shan and Xilin Chen. 2020. Cross-domain face presentation attack detection via multi-domain disentangled representation learning. In CVPR. 6678--6687.","DOI":"10.1109\/CVPR42600.2020.00671"},{"key":"e_1_3_2_2_47_1","volume-title":"Self-domain adaptation for face anti-spoofing. arXiv preprint arXiv:2102.12129","author":"Wang Jingjing","year":"2021","unstructured":"Jingjing Wang , Jingyi Zhang , Ying Bian , Youyi Cai , Chunmao Wang , and Shiliang Pu. 2021. Self-domain adaptation for face anti-spoofing. arXiv preprint arXiv:2102.12129 ( 2021 ). Jingjing Wang, Jingyi Zhang, Ying Bian, Youyi Cai, Chunmao Wang, and Shiliang Pu. 2021. Self-domain adaptation for face anti-spoofing. arXiv preprint arXiv:2102.12129 (2021)."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1007-0214(09)70135-X"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"Zezheng Wang Zitong Yu Chenxu Zhao Xiangyu Zhu Yunxiao Qin Qiusheng Zhou Feng Zhou and Zhen Lei. 2020. Deep spatial gradient and temporal depth learning for face anti-spoofing. In CVPR. 5042--5051. Zezheng Wang Zitong Yu Chenxu Zhao Xiangyu Zhu Yunxiao Qin Qiusheng Zhou Feng Zhou and Zhen Lei. 2020. Deep spatial gradient and temporal depth learning for face anti-spoofing. In CVPR. 5042--5051.","DOI":"10.1109\/CVPR42600.2020.00509"},{"key":"e_1_3_2_2_50_1","first-page":"746","article-title":"Face spoof detection with image distortion analysis","volume":"10","author":"Han Hu","year":"2015","unstructured":"DiWen, Hu Han , and Anil K Jain . 2015 . Face spoof detection with image distortion analysis . TIFS 10 , 4 (2015), 746 -- 761 . DiWen, Hu Han, and Anil K Jain. 2015. Face spoof detection with image distortion analysis. TIFS 10, 4 (2015), 746--761.","journal-title":"TIFS"},{"key":"e_1_3_2_2_51_1","unstructured":"Jianwen Xie Yang Lu Song-Chun Zhu and Yingnian Wu. 2016. A theory of generative convnet. In ICML. PMLR 2635--2644. Jianwen Xie Yang Lu Song-Chun Zhu and Yingnian Wu. 2016. A theory of generative convnet. In ICML. PMLR 2635--2644."},{"key":"e_1_3_2_2_52_1","volume-title":"Learning temporal features using LSTM-CNN architecture for face anti-spoofing","author":"Xu Zhenqi","unstructured":"Zhenqi Xu , Shan Li , and Weihong Deng . 2015. Learning temporal features using LSTM-CNN architecture for face anti-spoofing . In ACPR. IEEE , 141--145. Zhenqi Xu, Shan Li, and Weihong Deng. 2015. Learning temporal features using LSTM-CNN architecture for face anti-spoofing. In ACPR. IEEE, 141--145."},{"key":"e_1_3_2_2_53_1","volume-title":"Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601","author":"Yang Jianwei","year":"2014","unstructured":"Jianwei Yang , Zhen Lei , and Stan Z Li. 2014. Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601 ( 2014 ). Jianwei Yang, Zhen Lei, and Stan Z Li. 2014. Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601 (2014)."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"crossref","unstructured":"Jianwei Yang Zhen Lei Shengcai Liao and Stan Z Li. 2013. Face liveness detection with component dependent descriptor. In ICB. 1--6. Jianwei Yang Zhen Lei Shengcai Liao and Stan Z Li. 2013. Face liveness detection with component dependent descriptor. In ICB. 1--6.","DOI":"10.1109\/ICB.2013.6612955"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"crossref","unstructured":"Xiao Yang Wenhan Luo Linchao Bao Yuan Gao Dihong Gong Shibao Zheng Zhifeng Li and Wei Liu. 2019. Face anti-spoofing: Model matters so does data. In CVPR. 3507--3516. Xiao Yang Wenhan Luo Linchao Bao Yuan Gao Dihong Gong Shibao Zheng Zhifeng Li and Wei Liu. 2019. Face anti-spoofing: Model matters so does data. In CVPR. 3507--3516.","DOI":"10.1109\/CVPR.2019.00362"},{"key":"e_1_3_2_2_56_1","volume-title":"A face antispoofing database with diverse attacks","author":"Zhang Zhiwei","unstructured":"Zhiwei Zhang , Junjie Yan , Sifei Liu , Zhen Lei , Dong Yi , and Stan Z Li. 2012. A face antispoofing database with diverse attacks . In ICB. IEEE , 26--31. Zhiwei Zhang, Junjie Yan, Sifei Liu, Zhen Lei, Dong Yi, and Stan Z Li. 2012. A face antispoofing database with diverse attacks. In ICB. IEEE, 26--31."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/954339.954342"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2020.2974065"}],"event":{"name":"MM '22: The 30th ACM International Conference on Multimedia","location":"Lisboa Portugal","acronym":"MM '22","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 30th ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503161.3548073","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503161.3548073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:30Z","timestamp":1750186950000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503161.3548073"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":58,"alternative-id":["10.1145\/3503161.3548073","10.1145\/3503161"],"URL":"https:\/\/doi.org\/10.1145\/3503161.3548073","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2022-10-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}