{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:28:13Z","timestamp":1777656493508,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1145\/3664647.3680857","type":"proceedings-article","created":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T06:59:27Z","timestamp":1729925967000},"page":"994-1003","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Style-conditional Prompt Token Learning for Generalizable Face Anti-spoofing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2855-4246","authenticated-orcid":false,"given":"Jiabao","family":"Guo","sequence":"first","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6347-5060","authenticated-orcid":false,"given":"Huan","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, Beiijng, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8543-3742","authenticated-orcid":false,"given":"Yizhi","family":"Luo","sequence":"additional","affiliation":[{"name":"Sichuan Intelligent Transportation System Management Co., Ltd., Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1490-1741","authenticated-orcid":false,"given":"Xueli","family":"Hu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0048-372X","authenticated-orcid":false,"given":"Hang","family":"Zou","sequence":"additional","affiliation":[{"name":"China Telecom Research Institute, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0032-8631","authenticated-orcid":false,"given":"Yuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"China Telecom Research Institute, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1345-5736","authenticated-orcid":false,"given":"Hui","family":"Liu","sequence":"additional","affiliation":[{"name":"Central China Normal University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4307-9380","authenticated-orcid":false,"given":"Bo","family":"Zhao","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"OULU-NPU: A Mobile Face Presentation Attack Database with Real-World Variations. In 12th IEEE international conference on automatic face & gesture recognition(FGR). 612--618","author":"Boulkenafet Zinelabinde","year":"2017","unstructured":"Zinelabinde Boulkenafet, Jukka Komulainen, Lei Li, Xiaoyi Feng, and Abdenour Hadid. 2017. OULU-NPU: A Mobile Face Presentation Attack Database with Real-World Variations. In 12th IEEE international conference on automatic face & gesture recognition(FGR). 612--618."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00045"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16199"},{"key":"e_1_3_2_1_4_1","volume-title":"On the effectiveness of local binary patterns in face anti-spoofing","author":"Chingovska Ivana","unstructured":"Ivana Chingovska, Andr\u00e9 Anjos, and S\u00e9bastien Marcel. 2012. On the effectiveness of local binary patterns in face anti-spoofing. In BIOSIG. IEEE, 1--7."},{"key":"e_1_3_2_1_5_1","volume-title":"International Conference on Learning Representations( ICLR).","author":"Dosovitskiy Alexey","year":"2021","unstructured":"Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov, Dirk Weissenborn, Xiaohua Zhai, Thomas Unterthiner, Mostafa Dehghani, Matthias Minderer, Georg Heigold, Sylvain Gelly, et al. 2021. An image is worth 16x16 words: Transformers for image recognition at scale. In International Conference on Learning Representations( ICLR)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00779"},{"key":"e_1_3_2_1_7_1","volume-title":"Biometric face presentation attack detection with multi-channel convolutional neural network","author":"George Anjith","year":"2019","unstructured":"Anjith George, Zohreh Mostaani, David Geissenbuhler, Olegs Nikisins, Andr\u00e9 Anjos, and S\u00e9bastien Marcel. 2019. Biometric face presentation attack detection with multi-channel convolutional neural network. IEEE transactions on information forensics and security(TIFS) 15 (2019), 42--55."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19778-9_14"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_10_1","volume-title":"Adaptive Transformers for Robust Few-shot Cross-domain Face Anti-spoofing. arXiv preprint arXiv:2203.12175","author":"Huang Hsin-Ping","year":"2022","unstructured":"Hsin-Ping Huang, Deqing Sun, Yaojie Liu,Wen-Sheng Chu, Taihong Xiao, Jinwei Yuan, Hartwig Adam, and Ming-Hsuan Yang. 2022. Adaptive Transformers for Robust Few-shot Cross-domain Face Anti-spoofing. arXiv preprint arXiv:2203.12175 (2022)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00851"},{"key":"e_1_3_2_1_12_1","volume-title":"Convolutional bypasses are better vision transformer adapters. arXiv preprint arXiv:2207.07039","author":"Jie Shibo","year":"2022","unstructured":"Shibo Jie and Zhi-Hong Deng. 2022. Convolutional bypasses are better vision transformer adapters. arXiv preprint arXiv:2207.07039 (2022)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01832"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3351001"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00604"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-024-02135-2"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1049\/bme2.12002"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Ajian Liu and Yanyan Liang. 2022. MA-ViT: Modality-Agnostic Vision Transformers for Face Anti-Spoofing. In IJCAI-22. 1180--1186.","DOI":"10.24963\/ijcai.2022\/165"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00122"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3065495"},{"key":"e_1_3_2_1_21_1","volume-title":"FM-ViT: Flexible Modal Vision Transformers for Face Anti-Spoofing","author":"Liu Ajian","year":"2023","unstructured":"Ajian Liu, Zichang Tan, Zitong Yu, Chenxu Zhao, Jun Wan, Yanyan Liang, Zhen Lei, Du Zhang, S. Li, and Guodong Guo. 2023. FM-ViT: Flexible Modal Vision Transformers for Face Anti-Spoofing. IEEE transactions on information forensics and security(TIFS) 18 (2023), 4775--4786."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00202"},{"key":"e_1_3_2_1_23_1","volume-title":"Disentangling Facial Pose and Appearance Information for Face Anti-spoofing. In International conference on pattern recognition (ICPR). 4537--4543","author":"Liu Ajian","year":"2022","unstructured":"Ajian Liu, Jun Wan, Ning Jiang, Hongbin Wang, and Yanyan Liang. 2022. Disentangling Facial Pose and Appearance Information for Face Anti-spoofing. In International conference on pattern recognition (ICPR). 4537--4543."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00029"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00096"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Ajian Liu Chenxu Zhao Zitong Yu JunWan Anyang Su Xing Liu Zichang Tan Sergio Escalera Junliang Xing Yanyan Liang et al. 2022. Contrastive contextaware learning for 3d high-fidelity mask face presentation attack detection. IEEE transactions on information forensics and security(TIFS) 17 (2022) 2497--2507.","DOI":"10.1109\/TIFS.2022.3188149"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.193"},{"key":"e_1_3_2_1_28_1","unstructured":"Shubao Liu Ke-Yue Zhang Taiping Yao Mingwei Bi Shouhong Ding Jilin Li Feiyue Huang and Lizhuang Ma. 2021. Adaptive normalized representation learning for generalizable face anti-spoofing. In ACM MM. 1469--1477."},{"key":"e_1_3_2_1_29_1","volume-title":"Dual Reweighting Domain Generalization for Face Presentation Attack Detection. In International Joint Conference on Artificial Intelligence(IJCAI).","author":"Liu Shubao","year":"2021","unstructured":"Shubao Liu, Ke-Yue Zhang, Taiping Yao, Kekai Sheng, Shouhong Ding, Ying Tai, Jilin Li, Yuan Xie, and Lizhuang Ma. 2021. Dual Reweighting Domain Generalization for Face Presentation Attack Detection. In International Joint Conference on Artificial Intelligence(IJCAI)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19775-8_30"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3370721"},{"key":"e_1_3_2_1_32_1","volume-title":"Causal Intervention for Generalizable Face Anti-Spoofing. In IEEE International Conference on Multimedia and Expo (ICME).","author":"Liu Yuchen","year":"2022","unstructured":"Yuchen Liu, Yabo Chen, Wenrui Dai, Chenglin Li, Junni Zou, and Hongkai Xiong. 2022. Causal Intervention for Generalizable Face Anti-Spoofing. In IEEE International Conference on Multimedia and Expo (ICME)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01888"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00048"},{"key":"e_1_3_2_1_35_1","first-page":"3813","article-title":"Spoof trace disentanglement for generic face anti-spoofing","volume":"45","author":"Liu Yaojie","year":"2022","unstructured":"Yaojie Liu and Xiaoming Liu. 2022. Spoof trace disentanglement for generic face anti-spoofing. IEEE Transactions on Pattern Analysis and Machine Intelligence( TPAMI) 45, 3 (2022), 3813--3830.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence( TPAMI)"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00481"},{"key":"e_1_3_2_1_37_1","volume-title":"Umap: Uniform manifold approximation and projection for dimension reduction. arXiv preprint arXiv:1802.03426","author":"McInnes Leland","year":"2018","unstructured":"Leland McInnes, John Healy, and James Melville. 2018. Umap: Uniform manifold approximation and projection for dimension reduction. arXiv preprint arXiv:1802.03426 (2018)."},{"key":"e_1_3_2_1_38_1","unstructured":"Zohreh Mostaani Anjith George Guillaume Heusch David Geissbuhler and Sebastien Marcel. 2020. The High-Quality Wide Multi-Channel Attack (HQWMCA) database."},{"key":"e_1_3_2_1_39_1","volume-title":"Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, et al.","author":"Radford Alec","year":"2021","unstructured":"Alec Radford, Jong Wook Kim, Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, et al. 2021. Learning transferable visual models from natural language supervision. In ICML. PMLR, 8748--8763."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01026"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6873"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01803"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02353"},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR). 20281--20290","author":"Lu Yu-Ding","year":"2022","unstructured":"Chien-YiWang, Yu-Ding Lu, Shang-Ta Yang, and Shang-Hong Lai. 2022. Patchnet: A simple face anti-spoofing framework via fine-grained patch recognition. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR). 20281--20290."},{"key":"e_1_3_2_1_45_1","volume-title":"International Conference on Biometrics (ICB).","author":"Wang Guoqing","year":"2019","unstructured":"Guoqing Wang, Hu Han, Shiguang Shan, and Xilin Chen. 2019. Improving crossdatabase face presentation attack detection via adversarial domain adaptation. In International Conference on Biometrics (ICB)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00671"},{"key":"e_1_3_2_1_47_1","volume-title":"Unsupervised adversarial domain adaptation for cross-domain face presentation attack detection","author":"Wang Guoqing","year":"2020","unstructured":"Guoqing Wang, Hu Han, Shiguang Shan, and Xilin Chen. 2020. Unsupervised adversarial domain adaptation for cross-domain face presentation attack detection. IEEE transactions on information forensics and security(TIFS) 16 (2020), 56--69."},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the AAAI conference on artificial intelligence(AAAI)","volume":"35","author":"Zhang Jingyi","year":"2021","unstructured":"JingjingWang, Jingyi Zhang, Ying Bian, Youyi Cai, ChunmaoWang, and Shiliang Pu. 2021. Self-domain adaptation for face anti-spoofing. In Proceedings of the AAAI conference on artificial intelligence(AAAI), Vol. 35. 2746--2754."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i6.28359"},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 4123--4133","author":"Yu Zitong","year":"2022","unstructured":"ZhuoWang, ZezhengWang, Zitong Yu,Weihong Deng, Jiahong Li, Tingting Gao, and Zhongyuan Wang. 2022. Domain generalization via shuffled style assembly for face anti-spoofing. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 4123--4133."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00509"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400395"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00362"},{"key":"e_1_3_2_1_54_1","volume-title":"Salience-aware face presentation attack detection via deep reinforcement learning","author":"Yu Bingyao","year":"2021","unstructured":"Bingyao Yu, Jiwen Lu, Xiu Li, and Jie Zhou. 2021. Salience-aware face presentation attack detection via deep reinforcement learning. IEEE transactions on information forensics and security(TIFS) 17 (2021), 413--427."},{"key":"e_1_3_2_1_55_1","unstructured":"Zitong Yu Ajian Liu Chenxu Zhao Kevin H. M. Cheng Xu Cheng and Guoying Zhao. 2023. Flexible-Modal Face Anti-Spoofing: A Benchmark. arXiv:2202.08192 [cs.CV]"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3036338"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58529-7_38"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2020.2973001"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_5"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199754"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10095329"},{"key":"e_1_3_2_1_63_1","volume-title":"MFAE: Masked Frequency Autoencoders for Domain Generalization Face Anti-spoofing","author":"Zheng Tianyi","year":"2024","unstructured":"Tianyi Zheng, Bo Li, Shuang Wu, Ben Wan, Guodong Mu, Shice Liu, Shouhong Ding, and Jia Wang. 2024. MFAE: Masked Frequency Autoencoders for Domain Generalization Face Anti-spoofing. IEEE transactions on information forensics and security(TIFS) (2024)."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01631"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-022-01653-1"},{"key":"e_1_3_2_1_66_1","volume-title":"Domain generalization with mixstyle. arXiv preprint arXiv:2104.02008","author":"Zhou Kaiyang","year":"2021","unstructured":"Kaiyang Zhou, Yongxin Yang, Yu Qiao, and Tao Xiang. 2021. Domain generalization with mixstyle. arXiv preprint arXiv:2104.02008 (2021)."},{"key":"e_1_3_2_1_67_1","volume-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition(CVPR). 20453--20463","author":"Zhou Qianyu","year":"2023","unstructured":"Qianyu Zhou, Ke-Yue Zhang, Taiping Yao, Xuequan Lu, Ran Yi, Shouhong Ding, and Lizhuang Ma. 2023. Instance-aware domain generalization for face antispoofing. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition(CVPR). 20453--20463."}],"event":{"name":"MM '24: The 32nd ACM International Conference on Multimedia","location":"Melbourne VIC Australia","acronym":"MM '24","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 32nd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3680857","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664647.3680857","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:08Z","timestamp":1750295888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3680857"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":67,"alternative-id":["10.1145\/3664647.3680857","10.1145\/3664647"],"URL":"https:\/\/doi.org\/10.1145\/3664647.3680857","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]},"assertion":[{"value":"2024-10-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}