{"id":"https://openalex.org/W3119375473","doi":"https://doi.org/10.1145/3436369.3437404","title":"Analyzing Facial Temporal Patterns for Face Anti-Spoofing","display_name":"Analyzing Facial Temporal Patterns for Face Anti-Spoofing","publication_year":2020,"publication_date":"2020-10-30","ids":{"openalex":"https://openalex.org/W3119375473","doi":"https://doi.org/10.1145/3436369.3437404","mag":"3119375473"},"language":"en","primary_location":{"id":"doi:10.1145/3436369.3437404","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3436369.3437404","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 9th International Conference on Computing and Pattern Recognition","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060738182","display_name":"Jingtian Xia","orcid":null},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jingtian Xia","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053061988","display_name":"Siyang Song","orcid":"https://orcid.org/0000-0003-2339-5685"},"institutions":[{"id":"https://openalex.org/I142263535","display_name":"University of Nottingham","ror":"https://ror.org/01ee9ar58","country_code":"GB","type":"education","lineage":["https://openalex.org/I142263535"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Siyang Song","raw_affiliation_strings":["School of Computer Science, The University of Nottingham, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, The University of Nottingham, UK","institution_ids":["https://openalex.org/I142263535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101579518","display_name":"Yan Tang","orcid":"https://orcid.org/0000-0003-2950-7967"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Tang","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019313200","display_name":"Linlin Shen","orcid":"https://orcid.org/0000-0003-1420-0815"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linlin Shen","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, China","institution_ids":["https://openalex.org/I180726961"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5060738182"],"corresponding_institution_ids":["https://openalex.org/I180726961"],"apc_list":null,"apc_paid":null,"fwci":0.1515,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.47077024,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"7728","issue":null,"first_page":"200","last_page":"207"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9847999811172485,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8621155023574829},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7852988839149475},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6968938708305359},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.693041980266571},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.6126611828804016},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5719001293182373},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.5659142732620239},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.5616428852081299},{"id":"https://openalex.org/keywords/word-error-rate","display_name":"Word error rate","score":0.521181046962738},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.46824491024017334},{"id":"https://openalex.org/keywords/attack-patterns","display_name":"Attack patterns","score":0.4140547811985016},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.3792957663536072},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3403027653694153},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.08797517418861389}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8621155023574829},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7852988839149475},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6968938708305359},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.693041980266571},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.6126611828804016},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5719001293182373},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.5659142732620239},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.5616428852081299},{"id":"https://openalex.org/C40969351","wikidata":"https://www.wikidata.org/wiki/Q3516228","display_name":"Word error rate","level":2,"score":0.521181046962738},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.46824491024017334},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.4140547811985016},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.3792957663536072},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3403027653694153},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.08797517418861389},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3436369.3437404","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3436369.3437404","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 9th International Conference on Computing and Pattern Recognition","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1628791547","https://openalex.org/W1704933117","https://openalex.org/W1769933788","https://openalex.org/W1770095230","https://openalex.org/W1964357740","https://openalex.org/W1982209341","https://openalex.org/W2003092530","https://openalex.org/W2019915615","https://openalex.org/W2042718506","https://openalex.org/W2106938474","https://openalex.org/W2142256325","https://openalex.org/W2155893237","https://openalex.org/W2163487272","https://openalex.org/W2174309130","https://openalex.org/W2194775991","https://openalex.org/W2341318667","https://openalex.org/W2341528187","https://openalex.org/W2409050142","https://openalex.org/W2462996230","https://openalex.org/W2510926985","https://openalex.org/W2522438482","https://openalex.org/W2578178601","https://openalex.org/W2754376709","https://openalex.org/W2785945350","https://openalex.org/W2787613668","https://openalex.org/W2798097728","https://openalex.org/W2800327877","https://openalex.org/W2801012453","https://openalex.org/W2803017656","https://openalex.org/W2963656031","https://openalex.org/W2995081867","https://openalex.org/W3003850414","https://openalex.org/W3023763462","https://openalex.org/W3034594921","https://openalex.org/W3101998545","https://openalex.org/W4230503776","https://openalex.org/W4247924304","https://openalex.org/W4253050311","https://openalex.org/W4301264246"],"related_works":["https://openalex.org/W2949389737","https://openalex.org/W1895390915","https://openalex.org/W1989039360","https://openalex.org/W2908959303","https://openalex.org/W2976316911","https://openalex.org/W2060029454","https://openalex.org/W1560697087","https://openalex.org/W2029134147","https://openalex.org/W2136485282","https://openalex.org/W2146295394"],"abstract_inverted_index":{"Face":[0],"anti-spoofing":[1,40],"is":[2,135],"crucial":[3],"as":[4,166,168],"face":[5,27,39,66,106,118],"recognition":[6],"systems":[7],"are":[8,28],"widely":[9],"challenged":[10],"by":[11,82],"the":[12,47,60,79,84,139,159,162],"print":[13],"attack":[14],"and":[15,25,67,104,111,113,176],"replay":[16],"attack.":[17],"Since":[18],"facial":[19,52,145],"temporal":[20,35,48],"patterns":[21,49,63],"of":[22,50,64,93,161],"these":[23],"attacks":[24],"real":[26,65],"naturally":[29],"different,":[30],"this":[31],"paper":[32],"proposes":[33],"two":[34,153],"modelling":[36],"approaches":[37,149],"to":[38,45,58,74,88,137],"tasks.":[41],"Firstly,":[42],"we":[43,72,97],"propose":[44,73],"analyze":[46],"mid-level":[51],"attributes":[53],"in":[54],"spectral":[55],"domain,":[56],"aiming":[57],"find":[59],"unique":[61],"frequency":[62],"each":[68],"attack,":[69],"respectively.":[70],"Then,":[71,121],"directly":[75],"model":[76],"dynamics":[77],"from":[78,101,143],"given":[80],"data,":[81],"employing":[83],"dynamic":[85,144],"image":[86],"algorithm":[87],"generate":[89],"low-level":[90],"spatiotemporal":[91,141],"representations":[92],"videos.":[94],"In":[95],"particular,":[96],"extract":[98],"deep":[99],"features":[100,142],"both":[102],"global":[103],"local":[105],"parts,":[107],"i.e.":[108,165],"eyes,":[109],"nose":[110],"mouth,":[112],"then":[114],"fuse":[115],"them":[116],"for":[117],"spoofing":[119],"detection.":[120],"a":[122],"Convolutional":[123],"Neural":[124],"Networks":[125],"(CNN)":[126],"-":[127],"Long":[128],"Short-Term":[129],"Memory":[130],"(LSTM)":[131],"units":[132],"(CNN-LSTM)":[133],"architecture":[134],"introduced":[136],"learn":[138],"high-level":[140],"images.":[146],"The":[147,156],"proposed":[148],"were":[150],"evaluated":[151],"on":[152,174,183],"benchmark":[154],"databases.":[155],"results":[157],"suggest":[158],"effectiveness":[160],"second":[163],"approaches,":[164],"low":[167],"1.85%":[169],"Equal":[170],"Error":[171,180],"Rate":[172,181],"(EER)":[173],"CASIA-FASD":[175],"0.00%":[177],"Average":[178],"Classification":[179],"(ACER)":[182],"REPLAY-ATTACK":[184],"have":[185],"been":[186],"achieved.":[187]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
