{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:10:02Z","timestamp":1763341802695,"version":"3.45.0"},"reference-count":40,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.061019","type":"journal-article","created":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T04:12:18Z","timestamp":1742271138000},"page":"3097-3112","source":"Crossref","is-referenced-by-count":0,"title":["PNSS: Unknown Face Presentation Attack Detection with Pseudo Negative Sample Synthesis"],"prefix":"10.32604","volume":"83","author":[{"given":"Hongyang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yichen","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Zitong","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Zhuofu","family":"Tao","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"6162","article-title":"Learning meta face recognition in unseen domains","author":"Guo","year":"2020"},{"doi-asserted-by":"crossref","unstructured":"Yu Z, Qin Y, Li X, Zhao C, Lei Z, Zhao G. Deep learning for face anti-spoofing: a survey. arXiv:2106.14948. 2021.","key":"ref2","DOI":"10.1109\/TPAMI.2022.3215850"},{"key":"ref3","series-title":"Proceedings of the IEEE Winter Conference on Applications of Computer Vision (WACV)","first-page":"1179","article-title":"CASIA-SURF CeFA: a benchmark for multi-modal cross-ethnicity face anti-spoofing","author":"Liu","year":"2021"},{"key":"ref4","series-title":"European Conference on Computer Vision (ECCV)","article-title":"Celeba-spoof: large-scale face anti-spoofing dataset with rich annotations","author":"Zhang","year":"2020"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"107888","DOI":"10.1016\/j.patcog.2021.107888","article-title":"Unified unsupervised and semi-supervised domain adaptation network for cross-scenario face anti-spoofing","volume":"115","author":"Jia","year":"2021","journal-title":"Pattern Recognitn"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/j.patrec.2021.10.014","article-title":"Adversarial learning and decomposition-based domain generalization for face anti-spoofing","volume":"155","author":"Liu","year":"2022","journal-title":"Pattern Recognit Lett"},{"doi-asserted-by":"crossref","unstructured":"Csurka G. Domain adaptation for visual applications: a comprehensive survey. arXiv:1702.05374. 2017.","key":"ref7","DOI":"10.1007\/978-3-319-58347-1"},{"doi-asserted-by":"crossref","unstructured":"Zhou K, Liu Z, Qiao Y, Xiang T, Loy CC. Domain generalization: a survey. arXiv:2103.02503. 2022.","key":"ref8","DOI":"10.1109\/TPAMI.2022.3195549"},{"key":"ref9","series-title":"IEEE International Joint Conference on Biometrics (IJCB)","first-page":"1","article-title":"Anomaly detection-based unknown face presentation attack detection","author":"Baweja","year":"2020 Sep 28\u2013Oct 1"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1109\/LSP.2018.2889273","article-title":"One-class convolutional neural network","volume":"26","author":"Oza","year":"2019","journal-title":"IEEE Signal Process Lett"},{"key":"ref11","volume":"7728","author":"de Freitas Pereira","year":"2012","journal-title":"Computer Vision\u2014ACCV 2012 Workshops"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"2268","DOI":"10.1109\/TIFS.2016.2578288","article-title":"Secure face unlock: spoof detection on smartphones","volume":"11","author":"Patel","year":"2016","journal-title":"IEEE Transact Inform Foren Secur"},{"key":"ref13","first-page":"141","article-title":"Face antispoofing using speeded-up robust features and fisher vector encoding","volume":"24","author":"Boukanafet","year":"2017","journal-title":"IEEE Signal Process Lett"},{"key":"ref14","series-title":"2013 International Conference on Biometrics (ICB)","first-page":"1","article-title":"Face liveness detection with component dependent descriptor","author":"Yang","year":"2013 Jun 4\u20137"},{"key":"ref15","series-title":"2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"5294","article-title":"Searching central difference convolutional networks for face anti-spoofing","author":"Yu","year":"2020 Jun 13\u201319"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"3005","DOI":"10.1109\/TPAMI.2020.3036338","article-title":"NAS-FAS: static-dynamic central difference network search for face anti-spoofing","volume":"43","author":"Yu","year":"2021","journal-title":"IEEE Transact Pattern Anal Mach Intell"},{"doi-asserted-by":"crossref","unstructured":"Ming Z, Yu Z, Al-Ghadi M, Visani M, MuzzamilLuqman M, Burie JC. Vitranspad: video transformer using convolution and self-attention for face presentation attack detection. arXiv:2203.01562. 2022.","key":"ref17","DOI":"10.1109\/ICIP46576.2022.9897560"},{"key":"ref18","series-title":"2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"389","article-title":"Learning deep models for face antispoofing: binary or auxiliary supervision","author":"Liu","year":"2018 Jun 18\u201323"},{"key":"ref19","series-title":"2020 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)","first-page":"199","article-title":"Face anti-spoofing by fusing high and low frequency features for advanced generalization capability","author":"Chen","year":"2020 Aug 6\u20138"},{"key":"ref20","series-title":"European Conference on Computer Vision (ECCV)","article-title":"Face antispoofing with human material perception","author":"Yu","year":"2020"},{"key":"ref21","series-title":"2019 IEEE\/CVF International Conference on Computer Vision (ICCV)","first-page":"151","article-title":"Remote heart rate measurement from highly compressed facial videos: an end-to-end deep learning solution with video enhancement","author":"Yu","year":"2019 Oct 27\u2013Nov 2"},{"key":"ref22","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"25","article-title":"One-class face anti-spoofing via spoof cue map-guided feature learning","author":"Huang","year":"2024"},{"doi-asserted-by":"crossref","unstructured":"Narayan K, Patel VM. Hyp-OC: hyperbolic one class classification for face anti-spoofing. arXiv:2404.14406. 2024.","key":"ref23","DOI":"10.1109\/FG59268.2024.10581913"},{"key":"ref24","series-title":"2022 IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV)","first-page":"3065","article-title":"Multi-scale patch-based representation learning for image anomaly detection and segmentation","author":"Tsai","year":"2022 Jan 3\u20138"},{"key":"ref25","series-title":"2019 14th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2019)","first-page":"1","article-title":"Active authentication using an autoencoder regularized cnn-based one-class classifier","author":"Oza","year":"2019 May 14\u201318"},{"key":"ref26","series-title":"2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS)","first-page":"1","article-title":"Dual-minimax probability machines for one-class mobile active authentication","author":"Perera","year":"2018 Oct 22\u201325"},{"key":"ref27","series-title":"2017 IEEE International Joint Conference on Biometrics (IJCB)","first-page":"80","article-title":"An anomaly detection approach to face spoofing detection: a new formulation and evaluation protocol","author":"Arashloo","year":"2017 Oct 1\u20134"},{"key":"ref28","series-title":"The Tenth International Conference on Learning Representations (ICLR)","first-page":"25","article-title":"Vos: learning what you don\u2019t know by virtual outlier synthesis","author":"Du","year":"2022"},{"key":"ref29","series-title":"2017 IEEE International Conference on Computer Vision (ICCV)","first-page":"2999","article-title":"Focal loss for dense object detection","author":"Lin","year":"2017 Oct 22\u201329"},{"key":"ref30","series-title":"Proceedings of the European Conference on Computer Vision (ECCV)","first-page":"70","article-title":"Pairwise confusion for fine-grained visual classification","author":"Dubey","year":"2018"},{"key":"ref31","series-title":"2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017)","first-page":"612","article-title":"OULU-NPU: a mobile face presentation attack database with real-world variations","author":"Bouklenafet","year":"2017 May 30\u2013Jun 3"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","article-title":"Face spoof detection with image distortion analysis","volume":"10","author":"Wen","year":"2015","journal-title":"IEEE Transact Inform Foren Secur"},{"key":"ref33","series-title":"International Conference on Biometrics (ICB)","article-title":"On the effectiveness of local binary patterns in face antispoofing","author":"Chingovska","year":"2012"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","article-title":"Joint face detection and alignment using multitask cascaded convolutional networks","volume":"23","author":"Zhang","year":"2016","journal-title":"IEEE Signal Process Lett"},{"key":"ref35","series-title":"Proceedings of the British Machine Vision Conference 2015","first-page":"1","article-title":"Deep face recognition","author":"Parkhi","year":"2015"},{"unstructured":"Paszke A, Gross S, Chintala S, Chanan G, Yang E, DeVito Z, et al. Automatic differentiation in pytorch. 2017 [cited 2024 Dec 30]. Available from: https:\/\/openreview.net\/forum?id=BJJsrmfCZ.","key":"ref36"},{"year":"1999","author":"Sch\u00f6lkopf","journal-title":"Advances in Neural Information Processing Systems (NIPS)","key":"ref37"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1023\/B:MACH.0000008084.60811.49","article-title":"Support vector data description","volume":"54","author":"Tax","year":"2004","journal-title":"Mach Learn (ML)"},{"key":"ref39","first-page":"2825","article-title":"Scikit-learn: machine learning in Python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref40","series-title":"2019 International Conference on Biometrics (ICB)","first-page":"1","article-title":"Combining multiple one-class classifiers for anomaly based face spoofing attack detection","author":"Fatemifar","year":"2019 Jun 4\u20137"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-2\/TSP_CMC_61019\/TSP_CMC_61019.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:05:42Z","timestamp":1763341542000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n2\/60543"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":40,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.061019","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}