Page 490 - 《软件学报》2025年第9期
P. 490

朱建秋 等: 视觉注意力和域特征融合的人脸活体检测方法                                                     4401


                     1109/CVPR42600.2020.00671]
                 [20]   Jia YP, Zhang J, Shan SG, Chen XL. Single-side domain generalization for face anti-spoofing. In: Proc. of the 2020 IEEE/CVF Conf. on
                     Computer Vision and Pattern Recognition. Seattle: IEEE, 2020. 8481−8490. [doi: 10.1109/CVPR42600.2020.00851]
                 [21]   Tian YL, Sun C, Poole B, Krishnan D, Schmid C, Isola P. What makes for good views for contrastive learning? In: Proc. of the 34th Int’l
                     Conf. on Neural Information Processing Systems. Vancouver: Curran Associates Inc., 2020. 6827–6839.
                 [22]   Cui JQ, Zhong ZS, Tian ZT, Liu S, Yu B, Jia JY. Generalized parametric contrastive learning. IEEE Trans. on Pattern Analysis and
                     Machine Intelligence, 2024, 46(12): 7463–7474. [doi: 10.1109/TPAMI.2023.3278694]
                 [23]   Boulkenafet  Z,  Komulainen  J,  Li  L,  Feng  XY,  Hadid  A.  OULU-NPU:  A  mobile  face  presentation  attack  database  with  real-world
                     variations. In: Proc. of the 12th IEEE Int’l Conf. on Automatic Face & Gesture Recognition. Washington: IEEE, 2017. 612−618. [doi: 10.
                     1109/FG.2017.77]
                 [24]   Zhang ZW, Yan JJ, Liu SF, Lei Z, Yi D, Li SZ. A face antispoofing database with diverse attacks. In: Proc. of the 5th IAPR Int’l Conf. on
                     Biometrics (ICB). New Delhi: IEEE, 2012. 26−31. [doi: 10.1109/ICB.2012.6199754]
                 [25]   Chingovska I, Anjos A, Marcel S. On the effectiveness of local binary patterns in face anti-spoofing. In: Proc. of the 2012 Int’l Conf. of
                     Biometrics Special Interest Group. Darmstadt: IEEE, 2012. 1−7.
                 [26]   Di W, Hu H, Jain AK. Face spoof detection with image distortion analysis. IEEE Trans. on Information Forensics and Security, 2015,
                     10(4): 746–761. [doi: 10.1109/TIFS.2015.2400395]
                 [27]   Huang X, Belongie S. Arbitrary style transfer in real-time with adaptive instance normalization. In: Proc. of the 2017 IEEE Int’l Conf. on
                     Computer Vision (ICCV). Venice: IEEE, 2017. 1510–1519. [doi: 10.1109/ICCV.2017.167]
                 [28]   De Freitas Pereira T, Komulainen J, Anjos A, De Martino JM, Hadid A, Pietikäinen M, Marcel S. Face liveness detection using dynamic
                     texture. EURASIP Journal on Image and Video Processing, 2014, 2014(1): 2. [doi: 10.1186/1687-5281-2014-2]
                 [29]   Boulkenafet Z, Komulainen J, Hadid A. Face spoofing detection using colour texture analysis. IEEE Trans. on Information Forensics and
                     Security, 2016, 11(8): 1818–1830. [doi: 10.1109/TIFS.2016.2555286]
                 [30]   Wang JJ, Zhang JY, Bian Y, Cai YY, Wang CM, Pu SL. Self-domain adaptation for face anti-spoofing. In: Proc. of the 35th AAAI Conf.
                     on Artificial Intelligence. AAAI, 2021. 2746−2754. [doi: 10.1609/aaai.v35i4.16379]
                 [31]   Chen ZH, Yao TP, Sheng KK, Ding SH, Tai Y, Li JL, Huang FY, Jin XY. Generalizable representation learning for mixture domain face
                     anti-spoofing. In: Proc. of the 35th AAAI Conf. on Artificial Intelligence. AAAI, 2021. 1132–1139. [doi: 10.1609/aaai.v35i2.16199]
                 [32]   Liu  SB,  Zhang  KY,  Yao  TP,  Sheng  KK,  Ding  SH,  Tai  Y,  Li  JL,  Xie  Y,  Ma  LZ.  Dual  reweighting  domain  generalization  for  face
                     presentation attack detection. In: Proc. of the 30th Int’l Joint Conf. on Artificial Intelligence. Montreal: Morgan Kaufmann Press, 2021.
                     867–873. [doi: 10.24963/ijcai.2021/120]
                 [33]   Liu SB, Zhang KY, Yao TP, Bi MW, Ding SH, Li JL, Huang FY, Ma LZ. Adaptive normalized representation learning for generalizable
                     face anti-spoofing. In: Proc. of the 29th ACM Int’l Conf. on Multimedia. ACM, 2021. 1469–1477. [doi: 10.1145/3474085.3475279]
                 [34]   Liu AJ, Tan ZC, Liang YY, Wan J. Attack-agnostic deep face anti-spoofing. In: Proc. of the 2023 IEEE/CVF Conf. on Computer Vision
                     and Pattern Recognition Workshops. Vancouver: IEEE, 2023. 6336–6345. [doi: 10.1109/CVPRW59228.2023.00674]
                 [35]   Liu AJ, Tan ZC, Yu ZT, Zhao CX, Wan J, Liang YY, Lei Z, Zhang D, Li SZ, Guo GD. FM-ViT: Flexible modal vision Transformers for
                     face anti-spoofing. IEEE Trans. on Information Forensics and Security, 2023, 18: 4775–5786. [doi: 10.1109/TIFS.2023.3296330]
                 [36]   Määttä J, Hadid A, Pietikäinen M. Face spoofing detection from single images using micro-texture analysis. In: Proc. of the 2011 Int’l
                     Joint Conf. on Biometrics (IJCB). Washington: IEEE, 2011. 1−7. [doi: 10.1109/IJCB.2011.6117510]
                 [37]   Yang X, Luo WH, Bao LC, Gao Y, Gong DH, Zheng SB, Li ZF, Liu W. Face anti-spoofing: Model matters, so does data. In: Proc. of the
                     2019 IEEE/CVF Conf. on Computer Vision and Pattern Recognition. Long Beach: IEEE, 2019. 3502−3511. [doi: 10.1109/CVPR.2019.
                     00362]
                 [38]   Chen  HN,  Hu  GS,  Lei  Z,  Chen  YW,  Robertson  NM,  Li  SZ.  Attention-based  two-stream  convolutional  networks  for  face  spoofing
                     detection. IEEE Trans. on Information Forensics and Security, 2020, 15: 578–593. [doi: 10.1109/TIFS.2019.2922241]
                 [39]   Jourabloo A, Liu YJ, Liu XM. Face de-spoofing: Anti-spoofing via noise modeling. In: Proc. of the 15th European Conf. on Computer
                     Vision. Munich: Springer, 2018. 297−315. [doi: 10.1007/978-3-030-01261-8_18]
                 [40]   Zheng  W,  Yue  MY,  Zhao  SH,  Liu  SQ.  Attention-based  spatial-temporal  multi-scale  network  for  face  anti-spoofing.  IEEE  Trans.  on
                     Biometrics, Behavior, and Identity Science, 2021, 3(3): 296–307. [doi: 10.1109/TBIOM.2021.3066983]
                 [41]   Xu YW, Wu LF, Jian M, Zheng WS, Ma YK, Wang ZM. Identity-constrained noise modeling with metric learning for face anti-spoofing.
                     Neurocomputing, 2021, 434: 149–164. [doi: 10.1016/j.neucom.2020.12.095]
                 [42]   Tu XG, Zhao J, Xie M, Du GD, Zhang HS, Li JS, Ma Z, Feng JS. Learning generalizable and identity-discriminative representations for
                     face anti-spoofing. ACM Trans. on Intelligent Systems and Technology (TIST), 2020, 11(5): 60. [doi: 10.1145/3402446]
   485   486   487   488   489   490   491   492