{"id":"https://openalex.org/W3162295356","doi":"https://doi.org/10.1109/icpr48806.2021.9412407","title":"Face Anti-Spoofing Using Spatial Pyramid Pooling","display_name":"Face Anti-Spoofing Using Spatial Pyramid Pooling","publication_year":2021,"publication_date":"2021-01-10","ids":{"openalex":"https://openalex.org/W3162295356","doi":"https://doi.org/10.1109/icpr48806.2021.9412407","mag":"3162295356"},"language":"en","primary_location":{"id":"doi:10.1109/icpr48806.2021.9412407","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpr48806.2021.9412407","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 25th International Conference on Pattern Recognition (ICPR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072249624","display_name":"Lei Shi","orcid":"https://orcid.org/0000-0002-1170-3911"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lei Shi","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018863316","display_name":"Zhuo Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhuo Zhou","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091834117","display_name":"Zhenhua Guo","orcid":"https://orcid.org/0000-0002-8201-0864"},"institutions":[{"id":"https://openalex.org/I3131625388","display_name":"University Town of Shenzhen","ror":"https://ror.org/05f5j6225","country_code":"CN","type":"education","lineage":["https://openalex.org/I3131625388"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenhua Guo","raw_affiliation_strings":["Information Science & Technology Division, Tsinghua Shenzhen International Graduate School, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Information Science & Technology Division, Tsinghua Shenzhen International Graduate School, Shenzhen, China","institution_ids":["https://openalex.org/I3131625388"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5072249624"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":1.9807,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.86964165,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2126","last_page":"2133"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9835000038146973,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/overfitting","display_name":"Overfitting","score":0.9218206405639648},{"id":"https://openalex.org/keywords/pooling","display_name":"Pooling","score":0.8805917501449585},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8187366724014282},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7745888829231262},{"id":"https://openalex.org/keywords/pyramid","display_name":"Pyramid (geometry)","score":0.6986076235771179},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6946031451225281},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.5888445377349854},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5460947751998901},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5346381664276123},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4879752993583679},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.47340473532676697},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.434057354927063},{"id":"https://openalex.org/keywords/dropout","display_name":"Dropout (neural networks)","score":0.4197545647621155},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.41546687483787537},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3435836732387543},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3226293623447418},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09597021341323853},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.08409038186073303}],"concepts":[{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.9218206405639648},{"id":"https://openalex.org/C70437156","wikidata":"https://www.wikidata.org/wiki/Q7228652","display_name":"Pooling","level":2,"score":0.8805917501449585},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8187366724014282},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7745888829231262},{"id":"https://openalex.org/C142575187","wikidata":"https://www.wikidata.org/wiki/Q3358290","display_name":"Pyramid (geometry)","level":2,"score":0.6986076235771179},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6946031451225281},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.5888445377349854},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5460947751998901},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5346381664276123},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4879752993583679},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.47340473532676697},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.434057354927063},{"id":"https://openalex.org/C2776145597","wikidata":"https://www.wikidata.org/wiki/Q25339462","display_name":"Dropout (neural networks)","level":2,"score":0.4197545647621155},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.41546687483787537},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3435836732387543},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3226293623447418},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09597021341323853},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08409038186073303},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icpr48806.2021.9412407","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpr48806.2021.9412407","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 25th International Conference on Pattern Recognition (ICPR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G833431671","display_name":null,"funder_award_id":"61772296","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1509966554","https://openalex.org/W1606858007","https://openalex.org/W1677182931","https://openalex.org/W1686810756","https://openalex.org/W1704933117","https://openalex.org/W1982209341","https://openalex.org/W2003092530","https://openalex.org/W2107227001","https://openalex.org/W2108598243","https://openalex.org/W2109255472","https://openalex.org/W2136666231","https://openalex.org/W2163487272","https://openalex.org/W2163605009","https://openalex.org/W2174309130","https://openalex.org/W2194775991","https://openalex.org/W2295107390","https://openalex.org/W2302255633","https://openalex.org/W2325939864","https://openalex.org/W2341318667","https://openalex.org/W2510926985","https://openalex.org/W2518108298","https://openalex.org/W2551249768","https://openalex.org/W2578178601","https://openalex.org/W2755702751","https://openalex.org/W2784305176","https://openalex.org/W2787613668","https://openalex.org/W2883750974","https://openalex.org/W2885013511","https://openalex.org/W2963263347","https://openalex.org/W2963538232","https://openalex.org/W2964245886","https://openalex.org/W2969289739","https://openalex.org/W2971539529","https://openalex.org/W2971810730","https://openalex.org/W2981446661","https://openalex.org/W2992296732","https://openalex.org/W2992698063","https://openalex.org/W6636412649","https://openalex.org/W6684191040","https://openalex.org/W6684314024","https://openalex.org/W6698183232","https://openalex.org/W6754206849"],"related_works":["https://openalex.org/W4298017035","https://openalex.org/W3128220493","https://openalex.org/W2792147139","https://openalex.org/W3026913501","https://openalex.org/W3110700750","https://openalex.org/W2998675825","https://openalex.org/W4226354336","https://openalex.org/W4394636190","https://openalex.org/W2736804899","https://openalex.org/W2897443685"],"abstract_inverted_index":{"Face":[0],"recognition":[1],"system":[2],"is":[3,19,24,68,129],"vulnerable":[4],"to":[5,13,70,101,115],"many":[6,29],"kinds":[7],"of":[8,53,95,125],"presentation":[9],"attacks,":[10],"so":[11],"how":[12],"effectively":[14],"detect":[15],"whether":[16],"the":[17,21,98,112,126,143],"image":[18],"from":[20],"real":[22],"face":[23,79],"particularly":[25],"important.":[26],"At":[27],"present,":[28],"deep":[30],"learning-based":[31],"anti-spoofing":[32,80],"methods":[33],"have":[34,40],"been":[35],"proposed.":[36],"But":[37],"these":[38],"approaches":[39],"some":[41],"limitations,":[42],"for":[43],"example,":[44],"global":[45],"average":[46],"pooling":[47,85,109],"(GAP)":[48],"easily":[49,57],"loses":[50],"local":[51,117],"information":[52,59],"faces,":[54],"single-scale":[55],"features":[56,118],"ignore":[58],"differences":[60],"in":[61,111],"different":[62],"scales,":[63],"while":[64,119],"a":[65,78,92],"complex":[66],"network":[67],"prone":[69],"be":[71],"overfitting.":[72,103],"In":[73],"this":[74],"paper,":[75],"we":[76,88,105],"propose":[77],"approach":[81,145],"using":[82],"spatial":[83,107],"pyramid":[84,108],"(SPP).":[86],"Firstly,":[87],"use":[89,106],"ResNet-18":[90],"with":[91],"small":[93],"amount":[94],"parameter":[96],"as":[97],"basic":[99],"model":[100,114],"avoid":[102],"Further,":[104],"module":[110],"single":[113],"enhance":[116],"fusing":[120],"multi-scale":[121],"information.":[122],"The":[123,138],"effectiveness":[124],"proposed":[127,144],"method":[128],"evaluated":[130],"on":[131],"three":[132],"databases,":[133],"CASIA-FASD,":[134],"Replay-Attack":[135],"and":[136],"CASIA-SURF.":[137],"experimental":[139],"results":[140],"show":[141],"that":[142],"can":[146],"achieve":[147],"state-of-the-art":[148],"performance.":[149]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
