{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:05:17Z","timestamp":1766732717143,"version":"3.37.3"},"reference-count":34,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T00:00:00Z","timestamp":1628467200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program Special Fund","award":["2018YFC1505805","62072106","61070062","2020J01168","2020R0178","2020KFKT04"],"award-info":[{"award-number":["2018YFC1505805","62072106","61070062","2020J01168","2020R0178","2020KFKT04"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2018YFC1505805","62072106","61070062","2020J01168","2020R0178","2020KFKT04"],"award-info":[{"award-number":["2018YFC1505805","62072106","61070062","2020J01168","2020R0178","2020KFKT04"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["2018YFC1505805","62072106","61070062","2020J01168","2020R0178","2020KFKT04"],"award-info":[{"award-number":["2018YFC1505805","62072106","61070062","2020J01168","2020R0178","2020KFKT04"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Innovation Strategy Research Project of Fujian Province","award":["2018YFC1505805","62072106","61070062","2020J01168","2020R0178","2020KFKT04"],"award-info":[{"award-number":["2018YFC1505805","62072106","61070062","2020J01168","2020R0178","2020KFKT04"]}]},{"name":"Open Project of Fujian Key Laboratory of Severe Weather","award":["2018YFC1505805","62072106","61070062","2020J01168","2020R0178","2020KFKT04"],"award-info":[{"award-number":["2018YFC1505805","62072106","61070062","2020J01168","2020R0178","2020KFKT04"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,8,9]]},"abstract":"<jats:p>Face antispoofing detection aims to identify whether the user\u2019s face identity information is legal. Multimodality models generally have high accuracy. However, the existing works of face antispoofing detection have the problem of insufficient research on the safety of the model itself. Therefore, the purpose of this paper is to explore the vulnerability of existing face antispoofing models, especially multimodality models, when resisting various types of attacks. In this paper, we firstly study the resistance ability of multimodality models when they encounter white-box attacks and black-box attacks from the perspective of adversarial examples. Then, we propose a new method that combines mixed adversarial training and differentiable high-frequency suppression modules to effectively improve model safety. Experimental results show that the accuracy of the multimodality face antispoofing model is reduced from over 90% to about 10% when it is attacked by adversarial examples. But, after applying the proposed defence method, the model can still maintain more than 90% accuracy on original examples, and the accuracy of the model can reach more than 80% on attack examples.<\/jats:p>","DOI":"10.1155\/2021\/3670339","type":"journal-article","created":{"date-parts":[[2021,8,11]],"date-time":"2021-08-11T03:45:10Z","timestamp":1628653510000},"page":"1-12","source":"Crossref","is-referenced-by-count":6,"title":["Research on Multimodality Face Antispoofing Model Based on Adversarial Attacks"],"prefix":"10.1155","volume":"2021","author":[{"given":"Junjie","family":"Mao","sequence":"first","affiliation":[{"name":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350007, China"},{"name":"Digital Fujian Institute of Big Data Security Technology, Fuzhou 350007, China"},{"name":"Fujian Provincial Engineering Research Center of Big Data Analysis and Application, Fuzhou 350007, China"}]},{"given":"Bin","family":"Weng","sequence":"additional","affiliation":[{"name":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350007, China"},{"name":"Digital Fujian Institute of Big Data Security Technology, Fuzhou 350007, China"},{"name":"Fujian Provincial Engineering Research Center of Big Data Analysis and Application, Fuzhou 350007, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0531-1759","authenticated-orcid":true,"given":"Tianqiang","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350007, China"},{"name":"Digital Fujian Institute of Big Data Security Technology, Fuzhou 350007, China"},{"name":"Fujian Provincial Engineering Research Center of Big Data Analysis and Application, Fuzhou 350007, China"}]},{"given":"Feng","family":"Ye","sequence":"additional","affiliation":[{"name":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350007, China"},{"name":"Digital Fujian Institute of Big Data Security Technology, Fuzhou 350007, China"},{"name":"Fujian Provincial Engineering Research Center of Big Data Analysis and Application, Fuzhou 350007, China"}]},{"given":"Liqing","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350007, China"},{"name":"Digital Fujian Institute of Big Data Security Technology, Fuzhou 350007, China"},{"name":"Fujian Provincial Engineering Research Center of Big Data Analysis and Application, Fuzhou 350007, China"}]}],"member":"311","reference":[{"author":"T. Shen","key":"1","article-title":"Facebagnet: bag-of-local-features model for multi-modal face anti-spoofing"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/cvprw50498.2020.00333"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/cvprw50498.2020.00330"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2578288"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"8","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1117\/12.541955","article-title":"Live face detection based on the analysis of fourier spectra","volume-title":"Biometric Technology For Human Identification","author":"J. Li","year":"2004"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2007.4409068"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2007.902037"},{"first-page":"146","article-title":"Face spoofing detection using dynamic texture","author":"J. Komulainen","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/IASP.2009.5054589"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/IPTA.2016.7821013"},{"article-title":"Learn convolutional neural network for face anti-spoofing","year":"2014","author":"J. Yang","key":"14"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.03.019"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ACPR.2015.7486482"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2018.00048"},{"issue":"2","key":"18","first-page":"469","article-title":"Algorithm to generate adversarial examples for face-spoofing detection","volume":"30","author":"Y. Ma","year":"2019","journal-title":"Ruan Jian Xue Bao\/Journal of Software"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-019-01160-w"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10041-1"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09604-z"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1117\/1.jei.30.2.023023"},{"article-title":"Attacking CNN-based anti-spoofing face authentication in the physical domain","year":"2019","author":"B. Zhang","key":"23"},{"article-title":"Mitigating adversarial effects through randomization","year":"2017","author":"C. Xie","key":"24"},{"article-title":"Stochastic activation pruning for robust adversarial defense","year":"2018","author":"G. S. Dhillon","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2018.00191"},{"key":"27","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.cose.2020.101916","article-title":"RCA-SOC: a novel adversarial defense by refocusing on critical areas and strengthening object contours","volume":"96","author":"J. Chen","year":"2020","journal-title":"Computers & Security"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"I. J. Goodfellow","key":"28"},{"article-title":"Adversarial training for free!","year":"2019","author":"A. Shafahi","key":"29"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2020.01.002"},{"article-title":"Adversarial defense by suppressing high-frequency components","year":"2019","author":"Z. Zhang","key":"31"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/tbiom.2020.2973001"},{"first-page":"2574","article-title":"Deepfool: a simple and accurate method to fool deep neural networks","author":"S. M. Moosavi-Dezfooli","key":"33"},{"first-page":"3866","article-title":"Nattack: learning the distributions of adversarial examples for an improved black-box attack on deep neural networks","author":"Y. Li","key":"34"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/3670339.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/3670339.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/3670339.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,11]],"date-time":"2021-08-11T03:45:21Z","timestamp":1628653521000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/3670339\/"}},"subtitle":[],"editor":[{"given":"Zhili","family":"Zhou","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,8,9]]},"references-count":34,"alternative-id":["3670339","3670339"],"URL":"https:\/\/doi.org\/10.1155\/2021\/3670339","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,8,9]]}}}