{"id":"https://openalex.org/W3035240864","doi":"https://doi.org/10.1109/icme46284.2020.9102720","title":"Exploring Hypergraph Representation On Face Anti-Spoofing Beyond 2d Attacks","display_name":"Exploring Hypergraph Representation On Face Anti-Spoofing Beyond 2d Attacks","publication_year":2020,"publication_date":"2020-06-09","ids":{"openalex":"https://openalex.org/W3035240864","doi":"https://doi.org/10.1109/icme46284.2020.9102720","mag":"3035240864"},"language":"en","primary_location":{"id":"doi:10.1109/icme46284.2020.9102720","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icme46284.2020.9102720","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Multimedia and Expo (ICME)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034124842","display_name":"Gusi Te","orcid":"https://orcid.org/0000-0003-2259-5490"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Gusi Te","raw_affiliation_strings":["Wangxuan Institute of Computer Technology, Peking University, Beijing"],"affiliations":[{"raw_affiliation_string":"Wangxuan Institute of Computer Technology, Peking University, Beijing","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059045087","display_name":"Wei Hu","orcid":"https://orcid.org/0000-0002-9860-0922"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Hu","raw_affiliation_strings":["Wangxuan Institute of Computer Technology, Peking University, Beijing"],"affiliations":[{"raw_affiliation_string":"Wangxuan Institute of Computer Technology, Peking University, Beijing","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001396675","display_name":"Zongming Guo","orcid":"https://orcid.org/0000-0002-4944-9621"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zongming Guo","raw_affiliation_strings":["Wangxuan Institute of Computer Technology, Peking University, Beijing"],"affiliations":[{"raw_affiliation_string":"Wangxuan Institute of Computer Technology, Peking University, Beijing","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5034124842"],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":null,"apc_paid":null,"fwci":1.62553246,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.84378496,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12740","display_name":"Gait Recognition and Analysis","score":0.9660999774932861,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hypergraph","display_name":"Hypergraph","score":0.8503552675247192},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.798743724822998},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7644073963165283},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6305816173553467},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.6141465902328491},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.5929877161979675},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.5450778603553772},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5432828664779663},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.535463273525238},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5047401189804077},{"id":"https://openalex.org/keywords/invariant","display_name":"Invariant (physics)","score":0.49604305624961853},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4709179103374481},{"id":"https://openalex.org/keywords/convolution","display_name":"Convolution (computer science)","score":0.44328033924102783},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.40692460536956787},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32389283180236816},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.2596193850040436},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1155320405960083},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1128259003162384}],"concepts":[{"id":"https://openalex.org/C2781221856","wikidata":"https://www.wikidata.org/wiki/Q840247","display_name":"Hypergraph","level":2,"score":0.8503552675247192},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.798743724822998},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7644073963165283},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6305816173553467},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.6141465902328491},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.5929877161979675},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.5450778603553772},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5432828664779663},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.535463273525238},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5047401189804077},{"id":"https://openalex.org/C190470478","wikidata":"https://www.wikidata.org/wiki/Q2370229","display_name":"Invariant (physics)","level":2,"score":0.49604305624961853},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4709179103374481},{"id":"https://openalex.org/C45347329","wikidata":"https://www.wikidata.org/wiki/Q5166604","display_name":"Convolution (computer science)","level":3,"score":0.44328033924102783},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.40692460536956787},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32389283180236816},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2596193850040436},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1155320405960083},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1128259003162384},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C37914503","wikidata":"https://www.wikidata.org/wiki/Q156495","display_name":"Mathematical physics","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icme46284.2020.9102720","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icme46284.2020.9102720","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Multimedia and Expo (ICME)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.41999998688697815,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1662382123","https://openalex.org/W2006904655","https://openalex.org/W2095252718","https://openalex.org/W2125320497","https://openalex.org/W2136666231","https://openalex.org/W2136975665","https://openalex.org/W2151343288","https://openalex.org/W2158787690","https://openalex.org/W2165043427","https://openalex.org/W2170057991","https://openalex.org/W2510926985","https://openalex.org/W2519887557","https://openalex.org/W2617869948","https://openalex.org/W2739060149","https://openalex.org/W2780314033","https://openalex.org/W2787613668","https://openalex.org/W2892880750","https://openalex.org/W2894833919","https://openalex.org/W2963656031","https://openalex.org/W2964015378","https://openalex.org/W2964311892","https://openalex.org/W3101824741","https://openalex.org/W6637178625","https://openalex.org/W6684157366","https://openalex.org/W6685083254","https://openalex.org/W6726873649"],"related_works":["https://openalex.org/W4376608589","https://openalex.org/W3138003926","https://openalex.org/W4300037846","https://openalex.org/W1630514295","https://openalex.org/W1537073411","https://openalex.org/W2963081352","https://openalex.org/W2998478967","https://openalex.org/W4376608938","https://openalex.org/W4288275998","https://openalex.org/W3012240659"],"abstract_inverted_index":{"Face":[0],"anti-spoofing":[1,46,126],"plays":[2],"a":[3,58,66,102],"crucial":[4],"role":[5],"in":[6],"protecting":[7],"face":[8,25,45,62,104,125],"recognition":[9],"systems":[10],"from":[11],"various":[12,149],"attacks.":[13],"Previous":[14],"model-based":[15],"and":[16,60,110,119],"deep":[17],"learning":[18],"approaches":[19],"achieve":[20],"satisfactory":[21],"performance":[22,136],"for":[23,30,85,95],"2D":[24],"spoofs,":[26],"but":[27],"remain":[28],"limited":[29],"more":[31],"advanced":[32],"3D":[33,44,96,103,124,140],"attacks":[34],"such":[35],"as":[36,142,144],"vivid":[37],"masks.":[38],"In":[39],"this":[40],"paper,":[41],"we":[42,56,100],"address":[43],"via":[47],"the":[48,79,89,116,121,134,145],"proposed":[49,117,146],"Hypergraph":[50],"Convolutional":[51],"Neural":[52],"Networks":[53],"(HGCNN).":[54],"Firstly,":[55],"construct":[57],"computation-efficient":[59],"posture-invariant":[61],"representation":[63,74],"with":[64,82,107],"only":[65],"few":[67],"key":[68],"points":[69],"on":[70],"hypergraphs.":[71],"The":[72],"hypergraph":[73,83],"is":[75,92],"then":[76],"fed":[77],"into":[78],"designed":[80],"HGCNN":[81],"convolution":[84],"feature":[86],"extraction,":[87],"while":[88],"depth":[90,109],"auxiliary":[91],"also":[93],"exploited":[94],"mask":[97],"anti-spoofing.":[98],"Further,":[99],"build":[101],"attack":[105],"database":[106],"color,":[108],"infrared":[111],"light":[112],"information":[113],"to":[114],"validate":[115],"paradigm":[118],"overcome":[120],"deficiency":[122],"of":[123],"data.":[127],"Experiments":[128],"show":[129],"that":[130],"our":[131],"method":[132],"achieves":[133],"state-of-the-art":[135],"over":[137],"widely":[138],"used":[139],"databases":[141],"well":[143],"one":[147],"under":[148],"tests.":[150]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
