Page 490 - 《软件学报》2025年第9期
P. 490
朱建秋 等: 视觉注意力和域特征融合的人脸活体检测方法 4401
1109/CVPR42600.2020.00671]
[20] Jia YP, Zhang J, Shan SG, Chen XL. Single-side domain generalization for face anti-spoofing. In: Proc. of the 2020 IEEE/CVF Conf. on
Computer Vision and Pattern Recognition. Seattle: IEEE, 2020. 8481−8490. [doi: 10.1109/CVPR42600.2020.00851]
[21] Tian YL, Sun C, Poole B, Krishnan D, Schmid C, Isola P. What makes for good views for contrastive learning? In: Proc. of the 34th Int’l
Conf. on Neural Information Processing Systems. Vancouver: Curran Associates Inc., 2020. 6827–6839.
[22] Cui JQ, Zhong ZS, Tian ZT, Liu S, Yu B, Jia JY. Generalized parametric contrastive learning. IEEE Trans. on Pattern Analysis and
Machine Intelligence, 2024, 46(12): 7463–7474. [doi: 10.1109/TPAMI.2023.3278694]
[23] Boulkenafet Z, Komulainen J, Li L, Feng XY, Hadid A. OULU-NPU: A mobile face presentation attack database with real-world
variations. In: Proc. of the 12th IEEE Int’l Conf. on Automatic Face & Gesture Recognition. Washington: IEEE, 2017. 612−618. [doi: 10.
1109/FG.2017.77]
[24] Zhang ZW, Yan JJ, Liu SF, Lei Z, Yi D, Li SZ. A face antispoofing database with diverse attacks. In: Proc. of the 5th IAPR Int’l Conf. on
Biometrics (ICB). New Delhi: IEEE, 2012. 26−31. [doi: 10.1109/ICB.2012.6199754]
[25] Chingovska I, Anjos A, Marcel S. On the effectiveness of local binary patterns in face anti-spoofing. In: Proc. of the 2012 Int’l Conf. of
Biometrics Special Interest Group. Darmstadt: IEEE, 2012. 1−7.
[26] Di W, Hu H, Jain AK. Face spoof detection with image distortion analysis. IEEE Trans. on Information Forensics and Security, 2015,
10(4): 746–761. [doi: 10.1109/TIFS.2015.2400395]
[27] Huang X, Belongie S. Arbitrary style transfer in real-time with adaptive instance normalization. In: Proc. of the 2017 IEEE Int’l Conf. on
Computer Vision (ICCV). Venice: IEEE, 2017. 1510–1519. [doi: 10.1109/ICCV.2017.167]
[28] De Freitas Pereira T, Komulainen J, Anjos A, De Martino JM, Hadid A, Pietikäinen M, Marcel S. Face liveness detection using dynamic
texture. EURASIP Journal on Image and Video Processing, 2014, 2014(1): 2. [doi: 10.1186/1687-5281-2014-2]
[29] Boulkenafet Z, Komulainen J, Hadid A. Face spoofing detection using colour texture analysis. IEEE Trans. on Information Forensics and
Security, 2016, 11(8): 1818–1830. [doi: 10.1109/TIFS.2016.2555286]
[30] Wang JJ, Zhang JY, Bian Y, Cai YY, Wang CM, Pu SL. Self-domain adaptation for face anti-spoofing. In: Proc. of the 35th AAAI Conf.
on Artificial Intelligence. AAAI, 2021. 2746−2754. [doi: 10.1609/aaai.v35i4.16379]
[31] Chen ZH, Yao TP, Sheng KK, Ding SH, Tai Y, Li JL, Huang FY, Jin XY. Generalizable representation learning for mixture domain face
anti-spoofing. In: Proc. of the 35th AAAI Conf. on Artificial Intelligence. AAAI, 2021. 1132–1139. [doi: 10.1609/aaai.v35i2.16199]
[32] Liu SB, Zhang KY, Yao TP, Sheng KK, Ding SH, Tai Y, Li JL, Xie Y, Ma LZ. Dual reweighting domain generalization for face
presentation attack detection. In: Proc. of the 30th Int’l Joint Conf. on Artificial Intelligence. Montreal: Morgan Kaufmann Press, 2021.
867–873. [doi: 10.24963/ijcai.2021/120]
[33] Liu SB, Zhang KY, Yao TP, Bi MW, Ding SH, Li JL, Huang FY, Ma LZ. Adaptive normalized representation learning for generalizable
face anti-spoofing. In: Proc. of the 29th ACM Int’l Conf. on Multimedia. ACM, 2021. 1469–1477. [doi: 10.1145/3474085.3475279]
[34] Liu AJ, Tan ZC, Liang YY, Wan J. Attack-agnostic deep face anti-spoofing. In: Proc. of the 2023 IEEE/CVF Conf. on Computer Vision
and Pattern Recognition Workshops. Vancouver: IEEE, 2023. 6336–6345. [doi: 10.1109/CVPRW59228.2023.00674]
[35] Liu AJ, Tan ZC, Yu ZT, Zhao CX, Wan J, Liang YY, Lei Z, Zhang D, Li SZ, Guo GD. FM-ViT: Flexible modal vision Transformers for
face anti-spoofing. IEEE Trans. on Information Forensics and Security, 2023, 18: 4775–5786. [doi: 10.1109/TIFS.2023.3296330]
[36] Määttä J, Hadid A, Pietikäinen M. Face spoofing detection from single images using micro-texture analysis. In: Proc. of the 2011 Int’l
Joint Conf. on Biometrics (IJCB). Washington: IEEE, 2011. 1−7. [doi: 10.1109/IJCB.2011.6117510]
[37] Yang X, Luo WH, Bao LC, Gao Y, Gong DH, Zheng SB, Li ZF, Liu W. Face anti-spoofing: Model matters, so does data. In: Proc. of the
2019 IEEE/CVF Conf. on Computer Vision and Pattern Recognition. Long Beach: IEEE, 2019. 3502−3511. [doi: 10.1109/CVPR.2019.
00362]
[38] Chen HN, Hu GS, Lei Z, Chen YW, Robertson NM, Li SZ. Attention-based two-stream convolutional networks for face spoofing
detection. IEEE Trans. on Information Forensics and Security, 2020, 15: 578–593. [doi: 10.1109/TIFS.2019.2922241]
[39] Jourabloo A, Liu YJ, Liu XM. Face de-spoofing: Anti-spoofing via noise modeling. In: Proc. of the 15th European Conf. on Computer
Vision. Munich: Springer, 2018. 297−315. [doi: 10.1007/978-3-030-01261-8_18]
[40] Zheng W, Yue MY, Zhao SH, Liu SQ. Attention-based spatial-temporal multi-scale network for face anti-spoofing. IEEE Trans. on
Biometrics, Behavior, and Identity Science, 2021, 3(3): 296–307. [doi: 10.1109/TBIOM.2021.3066983]
[41] Xu YW, Wu LF, Jian M, Zheng WS, Ma YK, Wang ZM. Identity-constrained noise modeling with metric learning for face anti-spoofing.
Neurocomputing, 2021, 434: 149–164. [doi: 10.1016/j.neucom.2020.12.095]
[42] Tu XG, Zhao J, Xie M, Du GD, Zhang HS, Li JS, Ma Z, Feng JS. Learning generalizable and identity-discriminative representations for
face anti-spoofing. ACM Trans. on Intelligent Systems and Technology (TIST), 2020, 11(5): 60. [doi: 10.1145/3402446]

