{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:48:44Z","timestamp":1755802124886,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1145\/3731715.3733477","type":"proceedings-article","created":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T18:29:43Z","timestamp":1750876183000},"page":"2068-2072","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Face Anti-spoofing based on Contour-constrained Anomaly Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5759-7554","authenticated-orcid":false,"given":"Jiahui","family":"Wang","sequence":"first","affiliation":[{"name":"Xidian University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9090-6736","authenticated-orcid":false,"given":"Yuan","family":"Liu","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3448-2514","authenticated-orcid":false,"given":"Chunlei","family":"Peng","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8336-5651","authenticated-orcid":false,"given":"Yu","family":"Zheng","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, China"}]}],"member":"320","published-online":{"date-parts":[[2025,6,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Probabilistic modeling of deep features for out-of-distribution and adversarial detection. arXiv preprint arXiv:1909.11786","author":"Ahuja Nilesh A","year":"2019","unstructured":"Nilesh A Ahuja, Ibrahima Ndiour, Trushant Kalyanpur, and Omesh Tickoo. 2019. Probabilistic modeling of deep features for out-of-distribution and adversarial detection. arXiv preprint arXiv:1909.11786 (2019)."},{"key":"e_1_3_2_1_2_1","volume-title":"Ganomaly: Semi-supervised anomaly detection via adversarial training. In ACCV. 622--637.","author":"Akcay Samet","year":"2019","unstructured":"Samet Akcay, Amir Atapour-Abarghouei, and Toby P Breckon. 2019. Ganomaly: Semi-supervised anomaly detection via adversarial training. In ACCV. 622--637."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2024.3419426"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Thomas Defard Aleksandr Setkov Angelique Loesch and Romaric Audigier. 2021. Padim: a patch distribution modeling framework for anomaly detection and localization. In ICPR. 475--489.","DOI":"10.1007\/978-3-030-68799-1_35"},{"key":"e_1_3_2_1_5_1","volume-title":"Cflow-ad: Real-time unsupervised anomaly detection with localization via conditional normalizing flows. In WACV. 98--107.","author":"Gudovskiy Denis","year":"2022","unstructured":"Denis Gudovskiy, Shun Ishizaka, and Kazuki Kozuka. 2022. Cflow-ad: Real-time unsupervised anomaly detection with localization via conditional normalizing flows. In WACV. 98--107."},{"key":"e_1_3_2_1_6_1","volume-title":"Distilling the Knowledge in a Neural Network. arXiv preprint arXiv:1503.02531","author":"Hinton Geoffrey","year":"2015","unstructured":"Geoffrey Hinton, Oriol Vinyals, and Jeff Dean. 2015. Distilling the Knowledge in a Neural Network. arXiv preprint arXiv:1503.02531 (2015)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Ke Jia Yonghong Song Xiaomeng Wu and You Su. 2024. Video Anomaly Detection Via Self-Supervised Learning With Frame Interval and Rotation Prediction. In ICME. 1--6.","DOI":"10.1109\/ICME57554.2024.10687982"},{"key":"e_1_3_2_1_8_1","volume-title":"Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114","author":"Kingma Diederik P","year":"2013","unstructured":"Diederik P Kingma. 2013. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3193699"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Xinglin Lian Chengtai Cao Yan Liu Xovee Xu Yu Zheng and Fan Zhou. 2025. Facing Anomalies Head-On: Network Traffic Anomaly Detection via Uncertainty-Inspired Inter-Sample Differences. In WWW. 3908--3917.","DOI":"10.1145\/3696410.3714621"},{"key":"e_1_3_2_1_11_1","first-page":"8487","article-title":"Hierarchical vector quantized transformer for multi-class unsupervised anomaly detection","volume":"36","author":"Lu Ruiying","year":"2023","unstructured":"Ruiying Lu, YuJie Wu, Long Tian, Dongsheng Wang, Bo Chen, Xiyang Liu, and Ruimin Hu. 2023. Hierarchical vector quantized transformer for multi-class unsupervised anomaly detection. In NeurIPS, Vol. 36. 8487--8500.","journal-title":"NeurIPS"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Xavier Soria Poma Edgar Riba and Angel Sappa. 2020. Dense extreme inception network: Towards a robust cnn model for edge detection. In WACV. 1923--1932.","DOI":"10.1109\/WACV45572.2020.9093290"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Karsten Roth Latha Pemula Joaquin Zepeda Bernhard Sch\u00f6lkopf Thomas Brox and Peter Gehler. 2022. Towards total recall in industrial anomaly detection. In CVPR. 14318--14328.","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"e_1_3_2_1_14_1","volume-title":"Student-teacher feature pyramid matching for anomaly detection. arXiv preprint arXiv:2103.04257","author":"Wang Guodong","year":"2021","unstructured":"Guodong Wang, Shumin Han, Errui Ding, and Di Huang. 2021. Student-teacher feature pyramid matching for anomaly detection. arXiv preprint arXiv:2103.04257 (2021)."},{"key":"e_1_3_2_1_15_1","volume-title":"Fastflow: Unsupervised anomaly detection and localization via 2d normalizing flows. arXiv preprint arXiv:2111.07677","author":"Yu Jiawei","year":"2021","unstructured":"Jiawei Yu, Ye Zheng, Xiang Wang, Wei Li, Yushuang Wu, Rui Zhao, and Liwei Wu. 2021. Fastflow: Unsupervised anomaly detection and localization via 2d normalizing flows. arXiv preprint arXiv:2111.07677 (2021)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Vitjan Zavrtanik Matej Kristan and Danijel Skocaj. 2021. Draem-a discriminatively trained reconstruction embedding for surface anomaly detection. In ICCV. 8330--8339.","DOI":"10.1109\/ICCV48922.2021.00822"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Hailin Zhang Defang Chen and Can Wang. 2023. Adaptive Multi-Teacher Knowledge Distillation with Meta-Learning. In ICME. 1943--1948.","DOI":"10.1109\/ICME55011.2023.00333"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Yu Zheng Jiahui Wang Jiuyao Jing and Chunlei Peng. 2024. Face Anti-spoofing Based on Multi-view Anomaly Detection. In PRCV. 420--434.","DOI":"10.1007\/978-981-97-8499-8_29"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.14052"}],"event":{"name":"ICMR '25: International Conference on Multimedia Retrieval","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Chicago IL USA","acronym":"ICMR '25"},"container-title":["Proceedings of the 2025 International Conference on Multimedia Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3731715.3733477","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T04:11:31Z","timestamp":1755749491000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3731715.3733477"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":19,"alternative-id":["10.1145\/3731715.3733477","10.1145\/3731715"],"URL":"https:\/\/doi.org\/10.1145\/3731715.3733477","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]},"assertion":[{"value":"2025-06-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}