{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T00:37:38Z","timestamp":1775695058784,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1145\/3664647.3680856","type":"proceedings-article","created":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T06:59:27Z","timestamp":1729925967000},"page":"8228-8237","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["FM-CLIP: Flexible Modal CLIP for Face Anti-Spoofing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7788-9368","authenticated-orcid":false,"given":"Ajian","family":"Liu","sequence":"first","affiliation":[{"name":"Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0640-5671","authenticated-orcid":false,"given":"Hui","family":"Ma","sequence":"additional","affiliation":[{"name":"Macau University of Science and Technology, Macau, Macao"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9758-6944","authenticated-orcid":false,"given":"Junze","family":"Zheng","sequence":"additional","affiliation":[{"name":"Macau University of Science and Technology, Macau, Macao"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9540-9061","authenticated-orcid":false,"given":"Haocheng","family":"Yuan","sequence":"additional","affiliation":[{"name":"Macau University of Science and Technology, Macau, Macao"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5996-9033","authenticated-orcid":false,"given":"Xiaoyuan","family":"Yu","sequence":"additional","affiliation":[{"name":"Macau University of Science and Technology, Macau, Macao"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5780-8540","authenticated-orcid":false,"given":"Yanyan","family":"Liang","sequence":"additional","affiliation":[{"name":"Macau University of Science and Technology, Macau, Macao"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0617-8873","authenticated-orcid":false,"given":"Sergio","family":"Escalera","sequence":"additional","affiliation":[{"name":"University of Barcelona, Barcelona, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4735-2885","authenticated-orcid":false,"given":"Jun","family":"Wan","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0791-189X","authenticated-orcid":false,"given":"Zhen","family":"Lei","sequence":"additional","affiliation":[{"name":"MAIS, CASIA, School of Artificial Intelligence, UCAS &amp; CAIR, HKISI, CAS, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Zinelabinde Boulkenafet Jukka Komulainen Lei Li Xiaoyi Feng and Abdenour Hadid. 2017. OULU-NPU: A Mobile Face Presentation Attack Database with Real-World Variations. In FGR. 612--618.","DOI":"10.1109\/FG.2017.77"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00045"},{"key":"e_1_3_2_1_3_1","unstructured":"Ivana Chingovska Andr\u00e9 Anjos and S\u00e9bastien Marcel. 2012. On the effectiveness of local binary patterns in face anti-spoofing. In BIOSIG."},{"key":"e_1_3_2_1_4_1","volume-title":"Surveillance face anti-spoofing","author":"Fang Hao","year":"2023","unstructured":"Hao Fang, Ajian Liu, Jun Wan, Sergio Escalera, Chenxu Zhao, Xu Zhang, Stan Z Li, and Zhen Lei. 2023. Surveillance face anti-spoofing. IEEE Transactions on Information Forensics and Security (2023)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00120"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Anjith George and S\u00e9bastien Marcel. 2019. Deep Pixel-wise Binary Supervision for Face Presentation Attack Detection. In ICB.","DOI":"10.1109\/ICB45273.2019.8987370"},{"key":"e_1_3_2_1_7_1","volume-title":"Learning one class representations for face presentation attack detection using multi-channel convolutional neural networks","author":"George Anjith","year":"2020","unstructured":"Anjith George and S\u00e9bastien Marcel. 2020. Learning one class representations for face presentation attack detection using multi-channel convolutional neural networks. IEEE TIFS (2020)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Anjith George and S\u00e9bastien Marcel. 2021. Cross Modal Focal Loss for RGBD Face Anti-Spoofing. In CVPR. 7882--7891.","DOI":"10.1109\/CVPR46437.2021.00779"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916652"},{"key":"e_1_3_2_1_10_1","volume-title":"Adaptive Transformers for Robust Few-shot Cross-domain Face Anti-spoofing. arXiv preprint arXiv:2203.12175","author":"Huang Hsin-Ping","year":"2022","unstructured":"Hsin-Ping Huang, Deqing Sun, Yaojie Liu, Wen-Sheng Chu, Taihong Xiao, Jinwei Yuan, Hartwig Adam, and Ming-Hsuan Yang. 2022. Adaptive Transformers for Robust Few-shot Cross-domain Face Anti-spoofing. arXiv preprint arXiv:2203.12175 (2022)."},{"key":"e_1_3_2_1_11_1","unstructured":"international organization for standardization. 2016. ISO\/IEC JTC 1\/SC 37 Biometrics: Information technology biometric presentation attack detection part 1: Framework.. In https:\/\/www.iso.org\/obp\/ui\/iso."},{"key":"e_1_3_2_1_12_1","volume-title":"Suppress and Rebalance: Towards Generalized Multi-Modal Face Anti-Spoofing. arXiv preprint arXiv:2402.19298","author":"Lin Xun","year":"2024","unstructured":"Xun Lin, Shuai Wang, Rizhao Cai, Yizhong Liu, Ying Fu, Zitong Yu, Wenzhong Tang, and Alex Kot. 2024. Suppress and Rebalance: Towards Generalized Multi-Modal Face Anti-Spoofing. arXiv preprint arXiv:2402.19298 (2024)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109026"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-024-02135-2"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1049\/bme2.12002"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/165"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00122"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3065495"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3296330"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00029"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3188149"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Siqi Liu Baoyao Yang Pong C Yuen and Guoying Zhao. 2016. A 3D mask face anti-spoofing database with real world variations. In CVPRW.","DOI":"10.1109\/CVPRW.2016.193"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475279"},{"key":"e_1_3_2_1_24_1","volume-title":"2021 e. Dual reweighting domain generalization for face presentation attack detection. arXiv preprint arXiv:2106.16128","author":"Liu Shubao","year":"2021","unstructured":"Shubao Liu, Ke-Yue Zhang, Taiping Yao, Kekai Sheng, Shouhong Ding, Ying Tai, Jilin Li, Yuan Xie, and Lizhuang Ma. 2021 e. Dual reweighting domain generalization for face presentation attack detection. arXiv preprint arXiv:2106.16128 (2021)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Yuchen Liu Yabo Chen Wenrui Dai Mengran Gou Chun-Ting Huang and Hongkai Xiong. 2022. Source-Free Domain Adaptation with Contrastive Domain Alignment and Self-supervised Exploration for Face Anti-Spoofing. In ECCV.","DOI":"10.1007\/978-3-031-19775-8_30"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3370721"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Yuchen Liu Yabo Chen Wenrui Dai Chenglin Li Junni Zou and Hongkai Xiong. 2022. Causal Intervention for Generalizable Face Anti-Spoofing. In ICME.","DOI":"10.1109\/ICME52920.2022.9859783"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01888"},{"key":"e_1_3_2_1_29_1","unstructured":"Yaojie Liu Amin Jourabloo and Xiaoming Liu. 2018. Learning deep models for face anti-spoofing: Binary or auxiliary supervision. In CVPR."},{"key":"e_1_3_2_1_30_1","first-page":"3813","article-title":"Spoof trace disentanglement for generic face anti-spoofing","volume":"45","author":"Liu Yaojie","year":"2022","unstructured":"Yaojie Liu and Xiaoming Liu. 2022. Spoof trace disentanglement for generic face anti-spoofing. IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 45, 3 (2022), 3813--3830.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_3_2_1_31_1","volume-title":"On Disentangling Spoof Trace for Generic Face Anti-Spoofing","author":"Liu Yaojie","unstructured":"Yaojie Liu, Joel Stehouwer, and Xiaoming Liu. 2020. On Disentangling Spoof Trace for Generic Face Anti-Spoofing. In ECCV. Springer, 406--422."},{"key":"e_1_3_2_1_32_1","volume-title":"Umap: Uniform manifold approximation and projection for dimension reduction. arXiv preprint arXiv:1802.03426","author":"McInnes Leland","year":"2018","unstructured":"Leland McInnes, John Healy, and James Melville. 2018. Umap: Uniform manifold approximation and projection for dimension reduction. arXiv preprint arXiv:1802.03426 (2018)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01860"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"A. Parkin and O. Grinchuk. 2019. Recognizing Multi-Modal Face Spoofing With Face Recognition Networks. In CVPRW.","DOI":"10.1109\/CVPRW.2019.00204"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00082"},{"key":"e_1_3_2_1_36_1","volume-title":"International conference on machine learning. PMLR, 8748--8763","author":"Radford Alec","year":"2021","unstructured":"Alec Radford, Jong Wook Kim, Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, et al. 2021. Learning transferable visual models from natural language supervision. In International conference on machine learning. PMLR, 8748--8763."},{"key":"e_1_3_2_1_37_1","volume-title":"Yuen","author":"Shao Rui","year":"2019","unstructured":"Rui Shao, Xiangyuan Lan, Jiawei Li, and Pong C. Yuen. 2019. Multi-Adversarial Discriminative Deep Domain Generalization for Face Presentation Attack Detection. In CVPR."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6873"},{"key":"e_1_3_2_1_39_1","volume-title":"FLIP: Cross-Domain Face Anti-Spoofing with Language Guidance. In ICCV.","author":"Srivatsan Koushik","year":"2023","unstructured":"Koushik Srivatsan, Muzammal Naseer, and Karthik Nandakumar. 2023. FLIP: Cross-Domain Face Anti-Spoofing with Language Guidance. In ICCV."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02353"},{"key":"e_1_3_2_1_41_1","volume-title":"PatchNet: A Simple Face Anti-Spoofing Framework via Fine-Grained Patch Recognition. (June","author":"Wang Chien-Yi","year":"2022","unstructured":"Chien-Yi Wang, Yu-Ding Lu, Shang-Ta Yang, and Shang-Hong Lai. 2022. PatchNet: A Simple Face Anti-Spoofing Framework via Fine-Grained Patch Recognition. (June 2022), 20281--20290."},{"key":"e_1_3_2_1_42_1","volume-title":"Improving cross-database face presentation attack detection via adversarial domain adaptation","author":"Wang Guoqing","unstructured":"Guoqing Wang, Hu Han, Shiguang Shan, and Xilin Chen. 2019. Improving cross-database face presentation attack detection via adversarial domain adaptation. In ICB. IEEE."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Guoqing Wang Hu Han Shiguang Shan and Xilin Chen. 2020. Cross-domain Face Presentation Attack Detection via Multi-domain Disentangled Representation Learning. In CVPR. 6678--6687.","DOI":"10.1109\/CVPR42600.2020.00671"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i6.28359"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Zezheng Wang Zitong Yu Chenxu Zhao Xiangyu Zhu Yunxiao Qin Qiusheng Zhou Feng Zhou and Zhen Lei. 2020. Deep Spatial Gradient and Temporal Depth Learning for Face Anti-spoofing. In CVPR.","DOI":"10.1109\/CVPR42600.2020.00509"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.108881"},{"key":"e_1_3_2_1_47_1","unstructured":"Zitong Yu Rizhao Cai Yawen Cui Ajian Liu and Changsheng Chen. 2023. Visual Prompt Flexible-Modal Face Anti-Spoofing. arxiv: 2307.13958 [cs.CV]"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW59228.2023.00675"},{"key":"e_1_3_2_1_49_1","unstructured":"Zitong Yu Yunxiao Qin Xiaobai Li Zezheng Wang Chenxu Zhao Zhen Lei and Guoying Zhao. 2020. Multi-Modal Face Anti-Spoofing Based on Central Difference Networks. In CVPRW. 650--651."},{"key":"e_1_3_2_1_50_1","unstructured":"Zitong Yu Jun Wan Yunxiao Qin Xiaobai Li Stan Z. Li and Guoying Zhao. 2020. NAS-FAS: Static-Dynamic Central Difference Network Search for Face Anti-Spoofing. In TPAMI."},{"key":"e_1_3_2_1_51_1","unstructured":"Zitong Yu Chenxu Zhao Zezheng Wang Yunxiao Qin Zhuo Su Xiaobai Li Feng Zhou and Guoying Zhao. 2020. Searching Central Difference Convolutional Networks for Face Anti-Spoofing. In CVPR."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i3.25443"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2020.2973001"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00101"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Yuanhan Zhang Zhenfei Yin Yidong Li Guojun Yin Junjie Yan Jing Shao and Ziwei Liu. 2020. CelebA-Spoof: Large-Scale Face Anti-Spoofing Dataset with Rich Annotations. In ECCV.","DOI":"10.1007\/978-3-030-58610-2_5"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3371266"},{"key":"e_1_3_2_1_57_1","volume-title":"Chen Change Loy, and Ziwei Liu","author":"Zhou Kaiyang","year":"2022","unstructured":"Kaiyang Zhou, Jingkang Yang, Chen Change Loy, and Ziwei Liu. 2022. Learning to Prompt for Vision-Language Models. International Journal of Computer Vision (IJCV) (2022)."}],"event":{"name":"MM '24: The 32nd ACM International Conference on Multimedia","location":"Melbourne VIC Australia","acronym":"MM '24","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 32nd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3680856","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664647.3680856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:08Z","timestamp":1750295888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3680856"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":57,"alternative-id":["10.1145\/3664647.3680856","10.1145\/3664647"],"URL":"https:\/\/doi.org\/10.1145\/3664647.3680856","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]},"assertion":[{"value":"2024-10-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}