{"id":"https://openalex.org/W2962620000","doi":"https://doi.org/10.1109/fg.2019.8756569","title":"shallowCNN-LE: A shallow CNN with Laplacian Embedding for face anti-spoofing","display_name":"shallowCNN-LE: A shallow CNN with Laplacian Embedding for face anti-spoofing","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2962620000","doi":"https://doi.org/10.1109/fg.2019.8756569","mag":"2962620000"},"language":"en","primary_location":{"id":"doi:10.1109/fg.2019.8756569","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fg.2019.8756569","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 14th IEEE International Conference on Automatic Face &amp; Gesture Recognition (FG 2019)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120850185","display_name":"Xiaofeng Qu","orcid":"https://orcid.org/0000-0002-2119-5383"},"institutions":[{"id":"https://openalex.org/I34949971","display_name":"University of Jinan","ror":"https://ror.org/02mjz6f26","country_code":"CN","type":"education","lineage":["https://openalex.org/I34949971"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaofeng Qu","raw_affiliation_strings":["Shandong Provincial Key Laboratory of Network based Intelligent Computing, University of Jinan, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Network based Intelligent Computing, University of Jinan, Jinan, China","institution_ids":["https://openalex.org/I34949971"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101739938","display_name":"Jiwen Dong","orcid":"https://orcid.org/0000-0001-8830-8621"},"institutions":[{"id":"https://openalex.org/I34949971","display_name":"University of Jinan","ror":"https://ror.org/02mjz6f26","country_code":"CN","type":"education","lineage":["https://openalex.org/I34949971"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiwen Dong","raw_affiliation_strings":["Shandong Provincial Key Laboratory of Network based Intelligent Computing, University of Jinan, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Network based Intelligent Computing, University of Jinan, Jinan, China","institution_ids":["https://openalex.org/I34949971"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034946941","display_name":"Sijie Niu","orcid":null},"institutions":[{"id":"https://openalex.org/I34949971","display_name":"University of Jinan","ror":"https://ror.org/02mjz6f26","country_code":"CN","type":"education","lineage":["https://openalex.org/I34949971"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sijie Niu","raw_affiliation_strings":["Shandong Provincial Key Laboratory of Network based Intelligent Computing, University of Jinan, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Network based Intelligent Computing, University of Jinan, Jinan, China","institution_ids":["https://openalex.org/I34949971"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5120850185"],"corresponding_institution_ids":["https://openalex.org/I34949971"],"apc_list":null,"apc_paid":null,"fwci":1.6586,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.84607831,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12740","display_name":"Gait Recognition and Analysis","score":0.9815000295639038,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6662834882736206},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.6121881008148193},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6117057204246521},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4808705449104309},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.41106122732162476},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4106466472148895},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19003695249557495},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.05188333988189697}],"concepts":[{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6662834882736206},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.6121881008148193},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6117057204246521},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4808705449104309},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.41106122732162476},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4106466472148895},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19003695249557495},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.05188333988189697},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fg.2019.8756569","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fg.2019.8756569","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 14th IEEE International Conference on Automatic Face &amp; Gesture Recognition (FG 2019)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6800000071525574,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1487288055","https://openalex.org/W1889383825","https://openalex.org/W1934410531","https://openalex.org/W1982209341","https://openalex.org/W2003092530","https://openalex.org/W2009451935","https://openalex.org/W2095252718","https://openalex.org/W2120914216","https://openalex.org/W2136975665","https://openalex.org/W2142256325","https://openalex.org/W2145131129","https://openalex.org/W2163744678","https://openalex.org/W2174309130","https://openalex.org/W2194775991","https://openalex.org/W2418633638","https://openalex.org/W2473640056","https://openalex.org/W2498072672","https://openalex.org/W2594656819","https://openalex.org/W2739060149","https://openalex.org/W2753424941","https://openalex.org/W2765300765","https://openalex.org/W2768423623","https://openalex.org/W2770302610","https://openalex.org/W2772572641","https://openalex.org/W2776778982","https://openalex.org/W2782801008","https://openalex.org/W2784163702","https://openalex.org/W2790392345","https://openalex.org/W2963656031","https://openalex.org/W2963656735","https://openalex.org/W3097096317","https://openalex.org/W3101824741","https://openalex.org/W3103152812","https://openalex.org/W6674016869","https://openalex.org/W6678136989","https://openalex.org/W6684317009","https://openalex.org/W6735013348","https://openalex.org/W6741529863"],"related_works":["https://openalex.org/W1899364738","https://openalex.org/W43171467","https://openalex.org/W2103413230","https://openalex.org/W2908959303","https://openalex.org/W1955116508","https://openalex.org/W2136321227","https://openalex.org/W2663901905","https://openalex.org/W2355490025","https://openalex.org/W2170790090","https://openalex.org/W2126942212"],"abstract_inverted_index":{"Identity":[0],"authentication":[1,54],"based":[2],"on":[3,185],"face":[4,16,27,35,50,74,87,181,207],"recognition":[5,28],"has":[6],"been":[7],"significantly":[8],"improved":[9],"due":[10],"to":[11,47,83,133,179],"the":[12,86,97,107,119,127,136,149,154,160,164,167,203],"outstanding":[13],"ability":[14],"of":[15,79,156,188],"detection,":[17],"thus":[18],"it":[19],"plays":[20],"an":[21],"important":[22],"role":[23],"in":[24,52],"society.":[25],"However,":[26],"system":[29,55],"might":[30],"be":[31],"deceived":[32],"by":[33,117],"malicious":[34],"spoof":[36],"attacks":[37],"raising":[38],"risk":[39],"from":[40],"both":[41],"safety":[42],"and":[43,92,152,193],"property.":[44],"The":[45],"algorithm":[46],"accurately":[48,84],"detect":[49,85,180],"anti-spoofing":[51,208],"identity":[53],"is":[56,71,177],"becoming":[57],"crucial.":[58],"In":[59],"this":[60],"paper,":[61],"a":[62,142],"shallow":[63,99],"convolutional":[64],"neural":[65],"network":[66],"with":[67,126,163],"laplacian":[68,143,161],"embedding":[69,144,159],"(shallowCNN-LE)":[70],"proposed":[72,137,168,200],"for":[73,206],"anti-spoofing.":[75,182],"Two":[76],"different":[77],"types":[78],"features":[80,91,115,129,132],"are":[81],"concatenated":[82],"liveness,":[88],"including":[89],"depth":[90,128],"dynamic":[93,113],"texture":[94,114],"features.":[95],"First,":[96],"developed":[98],"CNN":[100],"model":[101,108],"contains":[102],"four":[103],"layers":[104],"which":[105,146,176],"make":[106],"faster.":[109],"Second,":[110],"we":[111,140],"integrate":[112],"extracted":[116],"using":[118],"dual":[120],"tree":[121],"complex":[122],"wavelet":[123],"transform":[124],"(DT-CWT)":[125],"as":[130],"input":[131],"feed":[134],"into":[135],"model.":[138],"Finally,":[139],"propose":[141],"algorithm,":[145],"can":[147,170],"maintain":[148],"inter-class":[150],"discrimination":[151],"penalize":[153],"distance":[155],"intra-class.":[157],"When":[158],"loss":[162],"softmax":[165],"loss,":[166],"method":[169,201],"obtain":[171],"much":[172],"more":[173],"discriminative":[174],"features,":[175],"helpful":[178],"Experimental":[183],"results":[184],"public":[186],"databases":[187],"CASIA":[189],"FASD,":[190],"Replay":[191],"attack":[192],"MSU":[194],"USSA":[195],"database":[196],"demonstrate":[197],"that":[198],"our":[199],"outperforms":[202],"state-of-the-art":[204],"methods":[205],"detection.":[209]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
