{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:26:45Z","timestamp":1777656405673,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1145\/3664647.3680855","type":"proceedings-article","created":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T06:59:27Z","timestamp":1729925967000},"page":"7619-7628","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Fine-Grained Prompt Learning for Face Anti-Spoofing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-1490-1741","authenticated-orcid":false,"given":"Xueli","family":"Hu","sequence":"first","affiliation":[{"name":"Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6347-5060","authenticated-orcid":false,"given":"Huan","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9540-9061","authenticated-orcid":false,"given":"Haocheng","family":"Yuan","sequence":"additional","affiliation":[{"name":"Macau University of Science and Technology, Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8238-109X","authenticated-orcid":false,"given":"Zhiyang","family":"Fu","sequence":"additional","affiliation":[{"name":"Macau University of Science and Technology, Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8543-3742","authenticated-orcid":false,"given":"Yizhi","family":"Luo","sequence":"additional","affiliation":[{"name":"Sichuan Intelligent Transportation System Management Co., Ltd., Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5262-0821","authenticated-orcid":false,"given":"Ning","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Forensic Science, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0048-372X","authenticated-orcid":false,"given":"Hang","family":"Zou","sequence":"additional","affiliation":[{"name":"China Telecom Research Institute, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4176-455X","authenticated-orcid":false,"given":"Jianwen","family":"Gan","sequence":"additional","affiliation":[{"name":"Wuzhou University, Wuzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0032-8631","authenticated-orcid":false,"given":"Yuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"China Telecom Research Institute, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2017.77"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/iccv48922.2021.00045"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16199"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16199"},{"key":"e_1_3_2_1_5_1","volume-title":"International Conference on Biometrics,International Conference on Biometrics (Sep","author":"Chingovska Ivana","year":"2012","unstructured":"Ivana Chingovska, Andr\u00e9 Anjos, and S\u00e9bastien Marcel. 2012. On the effectiveness of local binary patterns in face anti-spoofing. International Conference on Biometrics,International Conference on Biometrics (Sep 2012)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Debayan Deb Xiaoming Liu and Anil K Jain. 2023. Unified detection of digital and physical face attacks. In ICFG. 1--8.","DOI":"10.1109\/FG57933.2023.10042500"},{"key":"e_1_3_2_1_7_1","volume-title":"An Image is Worth 16x16 Words: Transformers for Image Recognition at Scale. arXiv: Computer Vision and Pattern Recognition,arXiv: Computer Vision and Pattern Recognition (Oct","author":"Dosovitskiy Alexey","year":"2020","unstructured":"Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov, Dirk Weissenborn, Xiaohua Zhai, Thomas Unterthiner, Mostafa Dehghani, Matthias Minderer, Georg Heigold, Sylvain Gelly, Jakob Uszkoreit, and Neil Houlsby. 2020. An Image is Worth 16x16 Words: Transformers for Image Recognition at Scale. arXiv: Computer Vision and Pattern Recognition,arXiv: Computer Vision and Pattern Recognition (Oct 2020)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548073"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW59228.2023.00677"},{"key":"e_1_3_2_1_10_1","volume-title":"Surveillance face anti-spoofing","author":"Fang Hao","year":"2023","unstructured":"Hao Fang, Ajian Liu, Jun Wan, Sergio Escalera, Chenxu Zhao, Xu Zhang, Stan Z Li, and Zhen Lei. 2023. Surveillance face anti-spoofing. IEEE Transactions on Information Forensics and Security (2023)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Hao Fang Ajian Liu Haocheng Yuan Junze Zheng Dingheng Zeng Yanhong Liu Jiankang Deng Sergio Escalera Xiaoming Liu Jun Wan and Zhen Lei. 2024. Unified Physical-Digital Face Attack Detection.","DOI":"10.24963\/ijcai.2024\/83"},{"key":"e_1_3_2_1_12_1","volume-title":"Domain adaptation via prompt learning","author":"Ge Chunjiang","year":"2023","unstructured":"Chunjiang Ge, Rui Huang, Mixue Xie, Zihang Lai, Shiji Song, Shuang Li, and Gao Huang. 2023. Domain adaptation via prompt learning. IEEE Transactions on Neural Networks and Learning Systems (2023)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Anjith George and S\u00e9bastien Marcel. 2021. Cross Modal Focal Loss for RGBD Face Anti-Spoofing. In CVPR. 7882--7891.","DOI":"10.1109\/CVPR46437.2021.00779"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2019.2916652"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2016.90"},{"key":"e_1_3_2_1_16_1","volume-title":"Adaptive Transformers for Robust Few-shot Cross-domain Face Anti-spoofing. arXiv preprint arXiv:2203.12175","author":"Huang Hsin-Ping","year":"2022","unstructured":"Hsin-Ping Huang, Deqing Sun, Yaojie Liu, Wen-Sheng Chu, Taihong Xiao, Jinwei Yuan, Hartwig Adam, and Ming-Hsuan Yang. 2022. Adaptive Transformers for Robust Few-shot Cross-domain Face Anti-spoofing. arXiv preprint arXiv:2203.12175 (2022)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr42600.2020.00851"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01261-8_18"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-024-02135-2"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1049\/bme2.12002"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/165"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/wacv48630.2021.00122"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3065495"},{"key":"e_1_3_2_1_24_1","volume-title":"Du Zhang, Stan Z Li, and Guodong Guo.","author":"Liu Ajian","year":"2023","unstructured":"Ajian Liu, Zichang Tan, Zitong Yu, Chenxu Zhao, Jun Wan, Yanyan Liang Zhen Lei, Du Zhang, Stan Z Li, and Guodong Guo. 2023. Fm-vit: Flexible modal vision transformers for face anti-spoofing. IEEE Transactions on Information Forensics and Security (2023)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00202"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00029"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00096"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3188149"},{"key":"e_1_3_2_1_29_1","volume-title":"2021 e. Dual Reweighting Domain Generalization for Face Presentation Attack Detection","author":"Liu Shubao","year":"2021","unstructured":"Shubao Liu, Keyue Zhang, Taiping Yao, Kekai Sheng, Shouhong Ding, Ying Tai, Jilin Li, Yuan Xie, and Lizhuang Ma. 2021 e. Dual Reweighting Domain Generalization for Face Presentation Attack Detection. Cornell University - arXiv,Cornell University - arXiv (Jun 2021)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475279"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00048"},{"key":"e_1_3_2_1_32_1","first-page":"3813","article-title":"Spoof trace disentanglement for generic face anti-spoofing","volume":"45","author":"Liu Yaojie","year":"2022","unstructured":"Yaojie Liu and Xiaoming Liu. 2022. Spoof trace disentanglement for generic face anti-spoofing. IEEE Transactions on Pattern Analysis and Machine Intelligence(TPAMI), Vol. 45, 3 (2022), 3813--3830.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence(TPAMI)"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00481"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6866"},{"key":"e_1_3_2_1_35_1","volume-title":"Learning Transferable Visual Models From Natural Language Supervision","author":"Radford Alec","year":"2021","unstructured":"Alec Radford, JongWook Kim, Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, Gretchen Krueger, and Ilya Sutskever. 2021. Learning Transferable Visual Models From Natural Language Supervision. Cornell University - arXiv,Cornell University - arXiv (Feb 2021)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.3113\/JSOA.2019.0201"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6873"},{"key":"e_1_3_2_1_38_1","unstructured":"Mainak Singha Harsh Pal Ankit Jha and Biplab Banerjee. 2023. AD-CLIP: Adapting Domains in Prompt Space Using CLIP. arxiv: 2308.05659 [cs.CV] https:\/\/arxiv.org\/abs\/2308.05659"},{"key":"e_1_3_2_1_39_1","volume-title":"FLIP: Cross-domain Face Anti-spoofing with Language Guidance. arXiv: Computer Vision and Pattern Recognition,arXiv:2309.16649 (Sep","author":"Srivatsan Koushik","year":"2023","unstructured":"Koushik Srivatsan, Muzammal Naseer, and Karthik Nandakumar. 2023. FLIP: Cross-domain Face Anti-spoofing with Language Guidance. arXiv: Computer Vision and Pattern Recognition,arXiv:2309.16649 (Sep 2023)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02353"},{"key":"e_1_3_2_1_41_1","volume-title":"Attention is All you Need. Neural Information Processing Systems,Neural Information Processing Systems (Jun","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, AidanN. Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. Attention is All you Need. Neural Information Processing Systems,Neural Information Processing Systems (Jun 2017)."},{"key":"e_1_3_2_1_42_1","volume-title":"PatchNet: A Simple Face Anti-Spoofing Framework via Fine-Grained Patch Recognition. (June","author":"Wang Chien-Yi","year":"2022","unstructured":"Chien-Yi Wang, Yu-Ding Lu, Shang-Ta Yang, and Shang-Hong Lai. 2022. PatchNet: A Simple Face Anti-Spoofing Framework via Fine-Grained Patch Recognition. (June 2022), 20281--20290."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW59228.2023.00679"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00671"},{"key":"e_1_3_2_1_45_1","volume-title":"Unsupervised Adversarial Domain Adaptation for Cross-Domain Face Presentation Attack Detection. TIFS","author":"Wang Guoqing","year":"2020","unstructured":"Guoqing Wang, Hu Han, Shiguang Shan, and Xilin Chen. 2020. Unsupervised Adversarial Domain Adaptation for Cross-Domain Face Presentation Attack Detection. TIFS (2020)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i4.16379"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i6.28359"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00409"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2015.2400395"},{"key":"e_1_3_2_1_50_1","volume-title":"Benchmarking joint face spoofing and forgery detection with visual and physiological cues. arXiv:2208.05401","author":"Yu Zitong","year":"2022","unstructured":"Zitong Yu, Rizhao Cai, Zhi Li, Wenhan Yang, Jingang Shi, and Alex C Kot. 2022. Benchmarking joint face spoofing and forgery detection with visual and physiological cues. arXiv:2208.05401 (2022)."},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings, Part VII 16","author":"Yu Zitong","year":"2020","unstructured":"Zitong Yu, Xiaobai Li, Xuesong Niu, Jingang Shi, and Guoying Zhao. 2020. Face anti-spoofing with human material perception. In Computer Vision--ECCV 2020: 16th European Conference, Glasgow, UK, August 23--28, 2020, Proceedings, Part VII 16. Springer, 557--575."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2022.3215850"},{"key":"e_1_3_2_1_53_1","unstructured":"Zitong Yu Jun Wan Yunxiao Qin Xiaobai Li Stan Z. Li and Guoying Zhao. 2020. NAS-FAS: Static-Dynamic Central Difference Network Search for Face Anti-Spoofing. In TPAMI."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr42600.2020.00534"},{"key":"e_1_3_2_1_55_1","volume-title":"Isabelle Guyon, and Zhen Lei.","author":"Yuan Haocheng","year":"2024","unstructured":"Haocheng Yuan, Ajian Liu, Junze Zheng, Jun Wan, Jiankang Deng, Sergio Escalera, Hugo Jair Escalante, Isabelle Guyon, and Zhen Lei. 2024. Unified Physical-Digital Attack Detection Challenge."},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings, Part XIX 16","author":"Zhang Ke-Yue","year":"2020","unstructured":"Ke-Yue Zhang, Taiping Yao, Jian Zhang, Ying Tai, Shouhong Ding, Jilin Li, Feiyue Huang, Haichuan Song, and Lizhuang Ma. 2020. Face anti-spoofing via disentangled representation learning. In Computer Vision--ECCV 2020: 16th European Conference, Glasgow, UK, August 23--28, 2020, Proceedings, Part XIX 16. Springer, 641--657."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2020.2973001"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00101"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199754"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3371266"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01631"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-022-01653--1"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01959"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3547769"}],"event":{"name":"MM '24: The 32nd ACM International Conference on Multimedia","location":"Melbourne VIC Australia","acronym":"MM '24","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 32nd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3680855","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664647.3680855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:08Z","timestamp":1750295888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3680855"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":64,"alternative-id":["10.1145\/3664647.3680855","10.1145\/3664647"],"URL":"https:\/\/doi.org\/10.1145\/3664647.3680855","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]},"assertion":[{"value":"2024-10-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}