{"id":"https://openalex.org/W3183833050","doi":"https://doi.org/10.1109/ijcb52358.2021.9484389","title":"Exploiting Non-uniform Inherent Cues to Improve Presentation Attack Detection","display_name":"Exploiting Non-uniform Inherent Cues to Improve Presentation Attack Detection","publication_year":2021,"publication_date":"2021-07-20","ids":{"openalex":"https://openalex.org/W3183833050","doi":"https://doi.org/10.1109/ijcb52358.2021.9484389","mag":"3183833050"},"language":"en","primary_location":{"id":"doi:10.1109/ijcb52358.2021.9484389","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcb52358.2021.9484389","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Joint Conference on Biometrics (IJCB)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042836970","display_name":"Yaowen Xu","orcid":"https://orcid.org/0000-0002-3946-9987"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yaowen Xu","raw_affiliation_strings":["Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034189361","display_name":"Zhuming Wang","orcid":"https://orcid.org/0000-0002-2230-5716"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhuming Wang","raw_affiliation_strings":["Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091049278","display_name":"Hu Han","orcid":"https://orcid.org/0000-0001-6010-1792"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hu Han","raw_affiliation_strings":["Key Laboratory of Intelligent Information Processing of Chinese Academy of Sciences (CAS), Institute of Computing Technology, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Information Processing of Chinese Academy of Sciences (CAS), Institute of Computing Technology, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005945981","display_name":"Lifang Wu","orcid":"https://orcid.org/0000-0002-7209-0215"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lifang Wu","raw_affiliation_strings":["Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001632441","display_name":"Yongluo Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongluo Liu","raw_affiliation_strings":["Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5042836970"],"corresponding_institution_ids":["https://openalex.org/I37796252"],"apc_list":null,"apc_paid":null,"fwci":1.2189,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.7897904,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9692000150680542,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8469076156616211},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6551976799964905},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5418984889984131},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.5189294815063477},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5182787775993347},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5058283805847168},{"id":"https://openalex.org/keywords/weighting","display_name":"Weighting","score":0.4767742455005646},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.44651758670806885},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.36480364203453064},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10749399662017822}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8469076156616211},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6551976799964905},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5418984889984131},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.5189294815063477},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5182787775993347},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5058283805847168},{"id":"https://openalex.org/C183115368","wikidata":"https://www.wikidata.org/wiki/Q856577","display_name":"Weighting","level":2,"score":0.4767742455005646},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.44651758670806885},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.36480364203453064},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10749399662017822},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C126838900","wikidata":"https://www.wikidata.org/wiki/Q77604","display_name":"Radiology","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcb52358.2021.9484389","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcb52358.2021.9484389","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Joint Conference on Biometrics (IJCB)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1522734439","https://openalex.org/W1704933117","https://openalex.org/W1982209341","https://openalex.org/W2037743333","https://openalex.org/W2063661788","https://openalex.org/W2129622867","https://openalex.org/W2151343288","https://openalex.org/W2163487272","https://openalex.org/W2187089797","https://openalex.org/W2341318667","https://openalex.org/W2341528187","https://openalex.org/W2418633638","https://openalex.org/W2510926985","https://openalex.org/W2597432857","https://openalex.org/W2728977829","https://openalex.org/W2778540638","https://openalex.org/W2778720069","https://openalex.org/W2885013511","https://openalex.org/W2894833919","https://openalex.org/W2956066883","https://openalex.org/W2963342110","https://openalex.org/W2963409771","https://openalex.org/W2963656031","https://openalex.org/W3005579832","https://openalex.org/W3005973417","https://openalex.org/W3034594921","https://openalex.org/W3035459165","https://openalex.org/W3046357449","https://openalex.org/W3097476359","https://openalex.org/W3101998545","https://openalex.org/W3108722472","https://openalex.org/W3109432287","https://openalex.org/W6637339757","https://openalex.org/W6684314024","https://openalex.org/W6780448029","https://openalex.org/W6781970753"],"related_works":["https://openalex.org/W2998478967","https://openalex.org/W2188559950","https://openalex.org/W2989910292","https://openalex.org/W3128793638","https://openalex.org/W2607818178","https://openalex.org/W2123299109","https://openalex.org/W2021230337","https://openalex.org/W3153057489","https://openalex.org/W2895823926","https://openalex.org/W2180954594"],"abstract_inverted_index":{"Face":[0],"anti-spoofing":[1],"plays":[2],"a":[3,28,51,150],"vital":[4],"role":[5],"in":[6,46,156],"face":[7],"recognition":[8],"systems.":[9],"The":[10],"existed":[11],"deep":[12],"learning":[13,90],"approaches":[14],"have":[15],"effectively":[16,56],"improved":[17],"the":[18,39,42,58,69,73,81,110,127,145,157,162],"performance":[19,70,152],"of":[20,34,41,84,153,161],"presentation":[21,35],"attack":[22],"detection":[23],"(PAD).":[24],"However,":[25],"they":[26,53],"learn":[27,102],"uniform":[29,94,132],"feature":[30],"for":[31],"different":[32,47,62,85],"types":[33,87],"attacks,":[36],"which":[37],"ignore":[38],"diversity":[40],"inherent":[43,82,103,111,129],"cues":[44,83,113,130],"presented":[45],"spoofing":[48,86],"types.":[49],"As":[50],"result,":[52],"can":[54],"not":[55],"represent":[57],"intrinsic":[59],"difference":[60],"between":[61],"spoof":[63],"faces":[64],"and":[65,68,109,131,148],"live":[66],"faces,":[67],"drops":[71],"on":[72,136],"cross-domain":[74,158],"databases.":[75],"In":[76],"this":[77],"paper,":[78],"we":[79],"introduce":[80],"by":[88],"non-uniform":[89,128],"as":[91],"complements":[92],"to":[93,101,125],"features.":[95,133],"Two":[96],"lightweight":[97],"sub-networks":[98],"are":[99],"designed":[100],"motion":[104],"patterns":[105],"from":[106,114],"photo":[107],"attacks":[108],"texture":[112],"video":[115],"attacks.":[116],"Furthermore,":[117],"an":[118],"element-wise":[119],"weighting":[120],"fusion":[121],"strategy":[122],"is":[123,166],"proposed":[124],"integrate":[126],"Extensive":[134],"experiments":[135],"four":[137],"public":[138],"databases":[139],"demonstrate":[140],"that":[141],"our":[142],"approach":[143],"outperforms":[144],"state-of-the-art":[146],"methods":[147],"achieves":[149],"superior":[151],"3.7%":[154],"ACER":[155],"Protocol":[159],"4":[160],"Oulu-NPU":[163],"database.":[164],"Code":[165],"available":[167],"at":[168],"https://github.com/BJUT-VIP/Non-uniform-cues.":[169]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
