{"id":"https://openalex.org/W2977806020","doi":"https://doi.org/10.1007/978-3-030-31456-9_27","title":"Latent Spatial Features Based on Generative Adversarial Networks for Face Anti-spoofing","display_name":"Latent Spatial Features Based on Generative Adversarial Networks for Face Anti-spoofing","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2977806020","doi":"https://doi.org/10.1007/978-3-030-31456-9_27","mag":"2977806020"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-31456-9_27","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-31456-9_27","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060738182","display_name":"Jingtian Xia","orcid":null},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jingtian Xia","raw_affiliation_strings":["Computer Vision Institute, School of Computer Science and Software Engineering, Shenzhen University, Shenzhen, 518060, China"],"affiliations":[{"raw_affiliation_string":"Computer Vision Institute, School of Computer Science and Software Engineering, Shenzhen University, Shenzhen, 518060, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101579518","display_name":"Yan Tang","orcid":"https://orcid.org/0000-0003-2950-7967"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Tang","raw_affiliation_strings":["Computer Vision Institute, School of Computer Science and Software Engineering, Shenzhen University, Shenzhen, 518060, China"],"affiliations":[{"raw_affiliation_string":"Computer Vision Institute, School of Computer Science and Software Engineering, Shenzhen University, Shenzhen, 518060, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101468071","display_name":"Xi Jia","orcid":"https://orcid.org/0000-0002-7034-5050"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xi Jia","raw_affiliation_strings":["Computer Vision Institute, School of Computer Science and Software Engineering, Shenzhen University, Shenzhen, 518060, China"],"affiliations":[{"raw_affiliation_string":"Computer Vision Institute, School of Computer Science and Software Engineering, Shenzhen University, Shenzhen, 518060, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019313200","display_name":"Linlin Shen","orcid":"https://orcid.org/0000-0003-1420-0815"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linlin Shen","raw_affiliation_strings":["Computer Vision Institute, School of Computer Science and Software Engineering, Shenzhen University, Shenzhen, 518060, China"],"affiliations":[{"raw_affiliation_string":"Computer Vision Institute, School of Computer Science and Software Engineering, Shenzhen University, Shenzhen, 518060, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113096621","display_name":"Zhihui Lai","orcid":null},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhihui Lai","raw_affiliation_strings":["Computer Vision Institute, School of Computer Science and Software Engineering, Shenzhen University, Shenzhen, 518060, China"],"affiliations":[{"raw_affiliation_string":"Computer Vision Institute, School of Computer Science and Software Engineering, Shenzhen University, Shenzhen, 518060, China","institution_ids":["https://openalex.org/I180726961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5060738182"],"corresponding_institution_ids":["https://openalex.org/I180726961"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.1903,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.77887463,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"240","last_page":"249"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8796272277832031},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.8567680716514587},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.7360016703605652},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6848793029785156},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6305105090141296},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.6286579370498657},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.6161076426506042},{"id":"https://openalex.org/keywords/generative-adversarial-network","display_name":"Generative adversarial network","score":0.5786556005477905},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.535780668258667},{"id":"https://openalex.org/keywords/convolution","display_name":"Convolution (computer science)","score":0.532513439655304},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4636579155921936},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.44458386301994324},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4241606295108795},{"id":"https://openalex.org/keywords/generative-model","display_name":"Generative model","score":0.41747811436653137},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.32235243916511536},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2115914523601532},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.16284063458442688}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8796272277832031},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.8567680716514587},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.7360016703605652},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6848793029785156},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6305105090141296},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.6286579370498657},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.6161076426506042},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.5786556005477905},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.535780668258667},{"id":"https://openalex.org/C45347329","wikidata":"https://www.wikidata.org/wiki/Q5166604","display_name":"Convolution (computer science)","level":3,"score":0.532513439655304},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4636579155921936},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.44458386301994324},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4241606295108795},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.41747811436653137},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.32235243916511536},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2115914523601532},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.16284063458442688},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-31456-9_27","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-31456-9_27","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1901129140","https://openalex.org/W1982209341","https://openalex.org/W2003092530","https://openalex.org/W2019915615","https://openalex.org/W2099471712","https://openalex.org/W2106938474","https://openalex.org/W2125389028","https://openalex.org/W2129622867","https://openalex.org/W2151343288","https://openalex.org/W2163487272","https://openalex.org/W2194775991","https://openalex.org/W2341318667","https://openalex.org/W2561675875","https://openalex.org/W2566832195","https://openalex.org/W2578178601","https://openalex.org/W2728977829","https://openalex.org/W2800327877","https://openalex.org/W2885013511","https://openalex.org/W2962793481","https://openalex.org/W2963073614","https://openalex.org/W2963470893","https://openalex.org/W2963567641","https://openalex.org/W2963656031","https://openalex.org/W2963767194","https://openalex.org/W6608993855"],"related_works":["https://openalex.org/W3007059209","https://openalex.org/W4220832730","https://openalex.org/W4313224733","https://openalex.org/W4312120756","https://openalex.org/W1688416049","https://openalex.org/W4288120931","https://openalex.org/W2972017669","https://openalex.org/W2783658022","https://openalex.org/W3005888540","https://openalex.org/W2836844603"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
