{"id":"https://openalex.org/W4378676933","doi":"https://doi.org/10.1145/3590003.3590023","title":"Face Anti-spoofing Method Based on Deep Supervision","display_name":"Face Anti-spoofing Method Based on Deep Supervision","publication_year":2023,"publication_date":"2023-03-17","ids":{"openalex":"https://openalex.org/W4378676933","doi":"https://doi.org/10.1145/3590003.3590023"},"language":"en","primary_location":{"id":"doi:10.1145/3590003.3590023","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3590003.3590023","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092045115","display_name":"Hongxia Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongxia Wang","raw_affiliation_strings":["School of Computer and Artificial Intelligence, Wuhan University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Artificial Intelligence, Wuhan University of Technology, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102917818","display_name":"Li Liu","orcid":"https://orcid.org/0009-0002-6421-5564"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Liu","raw_affiliation_strings":["School of Computer and Artificial Intelligence, Wuhan University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Artificial Intelligence, Wuhan University of Technology, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101451379","display_name":"Ailing Jia","orcid":null},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ailing Jia","raw_affiliation_strings":["School of Computer and Artificial Intelligence, Wuhan University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Artificial Intelligence, Wuhan University of Technology, China","institution_ids":["https://openalex.org/I196699116"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5092045115"],"corresponding_institution_ids":["https://openalex.org/I196699116"],"apc_list":null,"apc_paid":null,"fwci":0.4066,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.54716154,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"102","last_page":"106"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9684000015258789,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8070424795150757},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.741227924823761},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7153466939926147},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.6995457410812378},{"id":"https://openalex.org/keywords/convolution","display_name":"Convolution (computer science)","score":0.6413567662239075},{"id":"https://openalex.org/keywords/fuse","display_name":"Fuse (electrical)","score":0.637228786945343},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.5927110314369202},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.5558324456214905},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.499894380569458},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4708040952682495},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.44602081179618835},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.43116289377212524},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.15746542811393738},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.0829186737537384},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07065582275390625}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8070424795150757},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.741227924823761},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7153466939926147},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.6995457410812378},{"id":"https://openalex.org/C45347329","wikidata":"https://www.wikidata.org/wiki/Q5166604","display_name":"Convolution (computer science)","level":3,"score":0.6413567662239075},{"id":"https://openalex.org/C141353440","wikidata":"https://www.wikidata.org/wiki/Q182221","display_name":"Fuse (electrical)","level":2,"score":0.637228786945343},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.5927110314369202},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.5558324456214905},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.499894380569458},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4708040952682495},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.44602081179618835},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.43116289377212524},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.15746542811393738},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0829186737537384},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07065582275390625},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3590003.3590023","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3590003.3590023","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2885013511","https://openalex.org/W2963342110","https://openalex.org/W2963656031","https://openalex.org/W4200399832","https://openalex.org/W4246999471","https://openalex.org/W6600553734","https://openalex.org/W6600731417","https://openalex.org/W6600769105","https://openalex.org/W6601013545"],"related_works":["https://openalex.org/W3000097931","https://openalex.org/W2354322770","https://openalex.org/W2188559950","https://openalex.org/W2989910292","https://openalex.org/W2998478967","https://openalex.org/W3128793638","https://openalex.org/W2123299109","https://openalex.org/W4237547500","https://openalex.org/W2021230337","https://openalex.org/W3012240659"],"abstract_inverted_index":{"Although":[0],"face":[1,12,29,46,144],"recognition":[2,30],"technology":[3],"is":[4,8,23,33,59,103,124,137,150],"extensively":[5],"used,":[6],"it":[7,149],"vulnerable":[9],"to":[10,61,82,105,114,127,155],"various":[11],"spoofing":[13],"attacks,":[14],"such":[15],"as":[16,52,72],"photo":[17],"and":[18,32,76,148,173],"video":[19],"attacks.":[20],"Face":[21],"anti-spoofing":[22,47],"a":[24,133],"crucial":[25],"step":[26],"in":[27,110],"the":[28,37,67,73,78,84,89,94,99,107,111,130,140,153,164,170],"process":[31],"particularly":[34],"important":[35],"for":[36,139,152],"security":[38],"of":[39,44,96],"identity":[40],"verification.":[41],"However,":[42],"most":[43,143],"today's":[45],"algorithms":[48],"regard":[49],"this":[50,64],"task":[51],"an":[53],"image":[54],"binary":[55],"classification":[56],"problem,":[57],"which":[58],"easy":[60],"over-fit.":[62],"Therefore,":[63],"paper":[65],"builds":[66],"basic":[68],"deep":[69],"supervised":[70],"network":[71],"baseline":[74,112],"model":[75,113,154],"designs":[77],"central":[79,100],"gradient":[80,97,101,118],"convolution":[81,102,109],"extract":[83,156],"pixel":[85],"difference":[86],"information":[87],"within":[88],"local":[90],"region.":[91],"To":[92],"reduce":[93],"redundancy":[95],"features,":[98],"decoupled":[104],"replace":[106],"vanilla":[108],"form":[115],"two":[116],"cross-central":[117],"networks.":[119,131],"A":[120],"cross-feature":[121],"interaction":[122],"module":[123,136],"then":[125],"built":[126,138],"effectively":[128],"fuse":[129],"And":[132],"depth":[134],"uncertainty":[135],"problem":[141],"that":[142],"datasets":[145],"are":[146],"noisy":[147],"difficult":[151],"fuzzy":[157],"region":[158],"features.":[159],"Compared":[160],"with":[161],"existing":[162],"methods,":[163],"proposed":[165],"method":[166],"performs":[167],"well":[168],"on":[169],"OULU-NPU,":[171],"CASIA-FASD,":[172],"Replay-Attack":[174],"datasets.":[175]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
