{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:14:38Z","timestamp":1725498878548},"reference-count":65,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272197"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2023A1515011928"],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Visual Communication and Image Representation"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1016\/j.jvcir.2023.103886","type":"journal-article","created":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T15:30:56Z","timestamp":1688225456000},"page":"103886","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"special_numbering":"C","title":["Multiscale residual gradient attention for face anti-spoofing"],"prefix":"10.1016","volume":"95","author":[{"given":"Shiwei","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Shijun","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"12","key":"10.1016\/j.jvcir.2023.103886_b1","doi-asserted-by":"crossref","first-page":"1519","DOI":"10.1109\/TPAMI.2003.1251145","article-title":"Personal identification based on iris texture analysis","volume":"25","author":"Ma","year":"2003","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"8","key":"10.1016\/j.jvcir.2023.103886_b2","doi-asserted-by":"crossref","first-page":"2280","DOI":"10.1109\/TASL.2012.2201472","article-title":"Evaluation of speaker verification security and detection of HMM-based synthetic speech","volume":"20","author":"De Leon","year":"2012","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"key":"10.1016\/j.jvcir.2023.103886_b3","article-title":"A fingerprint technique for indoor localization using autoencoder based semi-supervised deep extreme learning machine","volume":"181","author":"Khatab","year":"2021","journal-title":"Signal Process."},{"key":"10.1016\/j.jvcir.2023.103886_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2019.107032","article-title":"A survey on 3D mask presentation attack detection and countermeasures","volume":"98","author":"Jia","year":"2020","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.jvcir.2023.103886_b5","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.jvcir.2015.03.001","article-title":"Variational feature representation-based classification for face recognition with single sample per person","volume":"30","author":"Ding","year":"2015","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"11","key":"10.1016\/j.jvcir.2023.103886_b6","doi-asserted-by":"crossref","first-page":"2396","DOI":"10.1109\/TIFS.2015.2458700","article-title":"Face spoofing detection based on multiple descriptor fusion using multiscale dynamic binarized statistical image features","volume":"10","author":"Arashloo","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"10.1016\/j.jvcir.2023.103886_b7","doi-asserted-by":"crossref","first-page":"1818","DOI":"10.1109\/TIFS.2016.2555286","article-title":"Face spoofing detection using colour texture analysis","volume":"11","author":"Boulkenafet","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"10.1016\/j.jvcir.2023.103886_b8","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1109\/TIFS.2017.2758748","article-title":"Face liveness detection using a flash against 2D spoofing attack","volume":"13","author":"Chan","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.jvcir.2023.103886_b9","series-title":"International Conference on Biometrics","first-page":"252","article-title":"Blinking-based live face detection using conditional random fields","author":"Sun","year":"2007"},{"key":"10.1016\/j.jvcir.2023.103886_b10","series-title":"International Conference on Computer Vision and Graphics","first-page":"669","article-title":"Eye blink based detection of liveness in biometric authentication systems using conditional random fields","author":"Szwoch","year":"2012"},{"issue":"3","key":"10.1016\/j.jvcir.2023.103886_b11","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1109\/TIFS.2007.902037","article-title":"Real-time face detection and motion analysis with application in \u201cliveness\u201d assessment","volume":"2","author":"Kollreider","year":"2007","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.jvcir.2023.103886_b12","series-title":"2009 International Conference on Image Analysis and Signal Processing","first-page":"233","article-title":"A liveness detection method for face recognition based on optical flow field","author":"Bao","year":"2009"},{"key":"10.1016\/j.jvcir.2023.103886_b13","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1016\/j.jvcir.2016.03.019","article-title":"Integration of image quality and motion cues for face anti-spoofing: A neural network approach","volume":"38","author":"Feng","year":"2016","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.jvcir.2023.103886_b14","doi-asserted-by":"crossref","unstructured":"A. Jourabloo, Y. Liu, X. Liu, Face de-spoofing: Anti-spoofing via noise modeling, in: Proceedings of the European Conference on Computer Vision, ECCV, 2018, pp. 290\u2013306.","DOI":"10.1007\/978-3-030-01261-8_18"},{"issue":"4","key":"10.1016\/j.jvcir.2023.103886_b15","doi-asserted-by":"crossref","first-page":"778","DOI":"10.1109\/TIFS.2015.2411394","article-title":"Face-spoofing 2D-detection based on moir\u00e9-pattern analysis","volume":"10","author":"Garcia","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.jvcir.2023.103886_b16","series-title":"2015 International Conference on Biometrics","first-page":"98","article-title":"Live face video vs. spoof face video: Use of moir\u00e9 patterns to detect replay video attacks","author":"Patel","year":"2015"},{"issue":"10","key":"10.1016\/j.jvcir.2023.103886_b17","doi-asserted-by":"crossref","first-page":"2268","DOI":"10.1109\/TIFS.2016.2578288","article-title":"Secure face unlock: Spoof detection on smartphones","volume":"11","author":"Patel","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.jvcir.2023.103886_b18","series-title":"2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems","first-page":"1","article-title":"Context based face anti-spoofing","author":"Komulainen","year":"2013"},{"key":"10.1016\/j.jvcir.2023.103886_b19","series-title":"2013 International Conference on Biometrics","first-page":"1","article-title":"Face liveness detection with component dependent descriptor","author":"Yang","year":"2013"},{"key":"10.1016\/j.jvcir.2023.103886_b20","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2019.102746","article-title":"Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning","volume":"66","author":"Peng","year":"2020","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.jvcir.2023.103886_b21","series-title":"2015 IEEE International Conference on Image Processing","first-page":"2636","article-title":"Face anti-spoofing based on color texture analysis","author":"Boulkenafet","year":"2015"},{"key":"10.1016\/j.jvcir.2023.103886_b22","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/j.jvcir.2018.05.009","article-title":"Face spoofing detection with local binary pattern network","volume":"54","author":"Li","year":"2018","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.jvcir.2023.103886_b23","article-title":"Bsnet: Dynamic hybrid gradient convolution based boundary-sensitive network for remote sensing image segmentation","author":"Hou","year":"2022","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"10.1016\/j.jvcir.2023.103886_b24","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1016\/j.jvcir.2016.03.019","article-title":"Integration of image quality and motion cues for face anti-spoofing: A neural network approach","volume":"38","author":"Feng","year":"2016","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.jvcir.2023.103886_b25","series-title":"2016 Sixth International Conference on Image Processing Theory, Tools and Applications","first-page":"1","article-title":"An original face anti-spoofing approach using partial convolutional neural network","author":"Li","year":"2016"},{"key":"10.1016\/j.jvcir.2023.103886_b26","series-title":"International Conference Image Analysis and Recognition","first-page":"27","article-title":"Transfer learning using convolutional neural networks for face anti-spoofing","author":"Lucena","year":"2017"},{"key":"10.1016\/j.jvcir.2023.103886_b27","series-title":"2017 2nd International Conference on Multimedia and Image Processing","first-page":"1","article-title":"3D convolutional neural network based on face anti-spoofing","author":"Gan","year":"2017"},{"key":"10.1016\/j.jvcir.2023.103886_b28","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1016\/j.jvcir.2019.02.014","article-title":"Face liveness detection using convolutional-features fusion of real and deep network generated face images","volume":"59","author":"Rehman","year":"2019","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.jvcir.2023.103886_b29","series-title":"2017 IEEE International Joint Conference on Biometrics","first-page":"319","article-title":"Face anti-spoofing using patch and depth-based CNNs","author":"Atoum","year":"2017"},{"key":"10.1016\/j.jvcir.2023.103886_b30","doi-asserted-by":"crossref","unstructured":"Y. Liu, A. Jourabloo, X. Liu, Learning deep models for face anti-spoofing: Binary or auxiliary supervision, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2018, pp. 389\u2013398.","DOI":"10.1109\/CVPR.2018.00048"},{"key":"10.1016\/j.jvcir.2023.103886_b31","doi-asserted-by":"crossref","unstructured":"X. Yang, W. Luo, L. Bao, Y. Gao, D. Gong, S. Zheng, Z. Li, W. Liu, Face anti-spoofing: Model matters, so does data, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 3507\u20133516.","DOI":"10.1109\/CVPR.2019.00362"},{"key":"10.1016\/j.jvcir.2023.103886_b32","doi-asserted-by":"crossref","unstructured":"Z. Yu, C. Zhao, Z. Wang, Y. Qin, Z. Su, X. Li, F. Zhou, G. Zhao, Searching central difference convolutional networks for face anti-spoofing, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 5295\u20135305.","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"10.1016\/j.jvcir.2023.103886_b33","series-title":"European Conference on Computer Vision","first-page":"557","article-title":"Face anti-spoofing with human material perception","author":"Yu","year":"2020"},{"key":"10.1016\/j.jvcir.2023.103886_b34","doi-asserted-by":"crossref","unstructured":"Y. Liu, J. Stehouwer, A. Jourabloo, X. Liu, Deep tree learning for zero-shot face anti-spoofing, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 4680\u20134689.","DOI":"10.1109\/CVPR.2019.00481"},{"key":"10.1016\/j.jvcir.2023.103886_b35","doi-asserted-by":"crossref","first-page":"3181","DOI":"10.1109\/TIFS.2020.2985530","article-title":"Face spoofing detection based on local ternary label supervision in fully convolutional networks","volume":"15","author":"Sun","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.jvcir.2023.103886_b36","series-title":"2020 IEEE International Joint Conference on Biometrics","first-page":"1","article-title":"3DPC-net: 3D point cloud network for face anti-spoofing","author":"Li","year":"2020"},{"key":"10.1016\/j.jvcir.2023.103886_b37","series-title":"2017 IEEE International Joint Conference on Biometrics","first-page":"688","article-title":"A competition on generalized software-based face presentation attack detection in mobile scenarios","author":"Boulkenafet","year":"2017"},{"key":"10.1016\/j.jvcir.2023.103886_b38","series-title":"An image is worth 16x16 words: Transformers for image recognition at scale","author":"Dosovitskiy","year":"2020"},{"key":"10.1016\/j.jvcir.2023.103886_b39","series-title":"Asian Conference on Computer Vision","first-page":"121","article-title":"LBP- TOP based countermeasure against face spoofing attacks","author":"de Freitas Pereira","year":"2012"},{"key":"10.1016\/j.jvcir.2023.103886_b40","doi-asserted-by":"crossref","unstructured":"S. Zhang, X. Wang, A. Liu, C. Zhao, J. Wan, S. Escalera, H. Shi, Z. Wang, S.Z. Li, A dataset and benchmark for large-scale multi-modal face anti-spoofing, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 919\u2013928.","DOI":"10.1109\/CVPR.2019.00101"},{"key":"10.1016\/j.jvcir.2023.103886_b41","doi-asserted-by":"crossref","unstructured":"A. Liu, Z. Tan, J. Wan, S. Escalera, G. Guo, S.Z. Li, Casia-surf cefa: A benchmark for multi-modal cross-ethnicity face anti-spoofing, in: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, 2021, pp. 1179\u20131187.","DOI":"10.1109\/WACV48630.2021.00122"},{"key":"10.1016\/j.jvcir.2023.103886_b42","doi-asserted-by":"crossref","first-page":"2759","DOI":"10.1109\/TIFS.2021.3065495","article-title":"Face anti-spoofing via adversarial cross-modality translation","volume":"16","author":"Liu","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.jvcir.2023.103886_b43","series-title":"Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, IJCAI-22","first-page":"1180","article-title":"MA-vit: Modality-agnostic vision transformers for face anti-spoofing","author":"Liu","year":"2022"},{"key":"10.1016\/j.jvcir.2023.103886_b44","article-title":"Attention is all you need","volume":"30","author":"Vaswani","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.jvcir.2023.103886_b45","series-title":"2021 IEEE International Joint Conference on Biometrics","first-page":"1","article-title":"On the effectiveness of vision transformers for zero-shot face anti-spoofing","author":"George","year":"2021"},{"key":"10.1016\/j.jvcir.2023.103886_b46","doi-asserted-by":"crossref","first-page":"1254","DOI":"10.1109\/TIFS.2022.3158062","article-title":"Learning multi-granularity temporal characteristics for face anti-spoofing","volume":"17","author":"Wang","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"10.1016\/j.jvcir.2023.103886_b47","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1109\/4.996","article-title":"Design of an image edge detection filter using the sobel operator","volume":"23","author":"Kanopoulos","year":"1988","journal-title":"IEEE J. Solid-State Circuits"},{"key":"10.1016\/j.jvcir.2023.103886_b48","series-title":"2010 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology","first-page":"99","article-title":"A hardware architecture of Prewitt edge detection","author":"Seif","year":"2010"},{"key":"10.1016\/j.jvcir.2023.103886_b49","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2020.107733","article-title":"Laplacian feature detection and feature alignment for multimodal ophthalmic image registration using phase correlation and Hessian affine feature space","volume":"177","author":"Suthaharan","year":"2020","journal-title":"Signal Process."},{"key":"10.1016\/j.jvcir.2023.103886_b50","doi-asserted-by":"crossref","unstructured":"S. Woo, J. Park, J.-Y. Lee, I.S. Kweon, Cbam: Convolutional block attention module, in: Proceedings of the European Conference on Computer Vision, ECCV, 2018, pp. 3\u201319.","DOI":"10.1007\/978-3-030-01234-2_1"},{"issue":"4","key":"10.1016\/j.jvcir.2023.103886_b51","first-page":"1455","article-title":"Face presentation attack detection based on optical flow and texture analysis","volume":"34","author":"Li","year":"2022","journal-title":"J. King Saud Univ., Comput. Inf. Sci."},{"key":"10.1016\/j.jvcir.2023.103886_b52","series-title":"2017 12th IEEE International Conference on Automatic Face & Gesture Recognition","first-page":"612","article-title":"Oulu-npu: A mobile face presentation attack database with real-world variations","author":"Boulkenafet","year":"2017"},{"key":"10.1016\/j.jvcir.2023.103886_b53","series-title":"2012 5th IAPR International Conference on Biometrics","first-page":"26","article-title":"A face antispoofing database with diverse attacks","author":"Zhang","year":"2012"},{"key":"10.1016\/j.jvcir.2023.103886_b54","series-title":"2012 BIOSIG-Proceedings of the International Conference of Biometrics Special Interest Group","first-page":"1","article-title":"On the effectiveness of local binary patterns in face anti-spoofing","author":"Chingovska","year":"2012"},{"issue":"4","key":"10.1016\/j.jvcir.2023.103886_b55","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","article-title":"Face spoof detection with image distortion analysis","volume":"10","author":"Wen","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.jvcir.2023.103886_b56","series-title":"JTC 1 SC 37\u2013\u2019Biometrics\u2019 International Standards","author":"Elliott","year":"2002"},{"key":"10.1016\/j.jvcir.2023.103886_b57","series-title":"2019 International Conference on Biometrics","first-page":"1","article-title":"Deep pixel-wise binary supervision for face presentation attack detection","author":"George","year":"2019"},{"key":"10.1016\/j.jvcir.2023.103886_b58","doi-asserted-by":"crossref","unstructured":"Y. Feng, F. Wu, X. Shao, Y. Wang, X. Zhou, Joint 3d face reconstruction and dense alignment with position map regression network, in: Proceedings of the European Conference on Computer Vision, ECCV, 2018, pp. 534\u2013551.","DOI":"10.1007\/978-3-030-01264-9_33"},{"key":"10.1016\/j.jvcir.2023.103886_b59","doi-asserted-by":"crossref","first-page":"13868","DOI":"10.1109\/ACCESS.2017.2729161","article-title":"An anomaly detection approach to face spoofing detection: A new formulation and evaluation protocol","volume":"5","author":"Arashloo","year":"2017","journal-title":"IEEE Access"},{"key":"10.1016\/j.jvcir.2023.103886_b60","series-title":"2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems","first-page":"1","article-title":"Unknown presentation attack detection with face rgb images","author":"Xiong","year":"2018"},{"key":"10.1016\/j.jvcir.2023.103886_b61","series-title":"Learn convolutional neural network for face anti-spoofing","author":"Yang","year":"2014"},{"key":"10.1016\/j.jvcir.2023.103886_b62","first-page":"11916","article-title":"Learning meta model for zero-and few-shot face anti-spoofing","volume":"vol. 34","author":"Qin","year":"2020"},{"issue":"9","key":"10.1016\/j.jvcir.2023.103886_b63","doi-asserted-by":"crossref","first-page":"3005","DOI":"10.1109\/TPAMI.2020.3036338","article-title":"NAS-fas: Static-dynamic central difference network search for face anti-spoofing","volume":"43","author":"Yu","year":"2020","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"12","key":"10.1016\/j.jvcir.2023.103886_b64","doi-asserted-by":"crossref","first-page":"4726","DOI":"10.1109\/TIP.2015.2466088","article-title":"Face spoofing detection through visual codebooks of spectral temporal cubes","volume":"24","author":"Pinto","year":"2015","journal-title":"IEEE Trans. Image Process."},{"issue":"11","key":"10.1016\/j.jvcir.2023.103886_b65","article-title":"Visualizing data using t-SNE","volume":"9","author":"Van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."}],"container-title":["Journal of Visual Communication and Image Representation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1047320323001360?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1047320323001360?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,5,9]],"date-time":"2024-05-09T03:36:36Z","timestamp":1715225796000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1047320323001360"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":65,"alternative-id":["S1047320323001360"],"URL":"https:\/\/doi.org\/10.1016\/j.jvcir.2023.103886","relation":{},"ISSN":["1047-3203"],"issn-type":[{"value":"1047-3203","type":"print"}],"subject":[],"published":{"date-parts":[[2023,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Multiscale residual gradient attention for face anti-spoofing","name":"articletitle","label":"Article Title"},{"value":"Journal of Visual Communication and Image Representation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jvcir.2023.103886","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103886"}}