{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,9]],"date-time":"2024-11-09T05:22:54Z","timestamp":1731129774174,"version":"3.28.0"},"reference-count":31,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Pattern Recognition Letters"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1016\/j.patrec.2024.06.014","type":"journal-article","created":{"date-parts":[[2024,6,22]],"date-time":"2024-06-22T05:04:39Z","timestamp":1719032679000},"page":"197-204","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["An efficient ensemble explainable AI (XAI) approach for morphed face detection"],"prefix":"10.1016","volume":"184","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-7836-2683","authenticated-orcid":false,"given":"Rudresh","family":"Dwivedi","sequence":"first","affiliation":[]},{"given":"Pranay","family":"Kothari","sequence":"additional","affiliation":[]},{"given":"Deepak","family":"Chopra","sequence":"additional","affiliation":[]},{"given":"Manjot","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Ritesh","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.patrec.2024.06.014_b1","doi-asserted-by":"crossref","DOI":"10.1002\/widm.1312","article-title":"Causability and explainability of artificial intelligence in medicine","volume":"9","author":"Holzinger","year":"2019","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov."},{"issue":"6","key":"10.1016\/j.patrec.2024.06.014_b2","doi-asserted-by":"crossref","DOI":"10.1002\/widm.1368","article-title":"Explainable artificial intelligence and machine learning: A reality rooted perspective","volume":"10","author":"Emmert-Streib","year":"2020","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov."},{"journal-title":"Pattern Recognit. Lett.","article-title":"Towards realistic fingerprint presentation attacks: The ScreenSpoof method","year":"2022","author":"Casula","key":"10.1016\/j.patrec.2024.06.014_b3"},{"key":"10.1016\/j.patrec.2024.06.014_b4","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.patrec.2021.10.013","article-title":"FinPAD: State-of-the-art of fingerprint presentation attack detection mechanisms, taxonomy and future perspectives","volume":"152","author":"Sharma","year":"2021","journal-title":"Pattern Recognit. Lett."},{"key":"10.1016\/j.patrec.2024.06.014_b5","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.116786","article-title":"Finger-vein presentation attack detection using depthwise separable convolution neural network","volume":"198","author":"Shaheed","year":"2022","journal-title":"Expert Syst. Appl."},{"year":"2014","series-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","key":"10.1016\/j.patrec.2024.06.014_b6"},{"key":"10.1016\/j.patrec.2024.06.014_b7","doi-asserted-by":"crossref","unstructured":"M.T. Ribeiro, S. Singh, C. Guestrin, \u201cWhy should i trust you?\u201d Explaining the predictions of any classifier, in: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016, pp. 1135\u20131144.","DOI":"10.1145\/2939672.2939778"},{"key":"10.1016\/j.patrec.2024.06.014_b8","doi-asserted-by":"crossref","unstructured":"B. Zhou, A. Khosla, A. Lapedriza, A. Oliva, A. Torralba, Learning deep features for discriminative localization, in: Proc. of the IEEE Conference on Computer Vision and Pattern Recognition, 2016, pp. 2921\u20132929.","DOI":"10.1109\/CVPR.2016.319"},{"key":"10.1016\/j.patrec.2024.06.014_b9","doi-asserted-by":"crossref","unstructured":"R.R. Selvaraju, M. Cogswell, A. Das, R. Vedantam, D. Parikh, D. Batra, Grad-cam: Visual explanations from deep networks via gradient-based localization, in: Proceedings of the IEEE International Conference on Computer Vision, 2017, pp. 618\u2013626.","DOI":"10.1109\/ICCV.2017.74"},{"key":"10.1016\/j.patrec.2024.06.014_b10","series-title":"International Conference on Machine Learning","first-page":"2668","article-title":"Interpretability beyond feature attribution: Quantitative testing with concept activation vectors (tcav)","author":"Kim","year":"2018"},{"key":"10.1016\/j.patrec.2024.06.014_b11","series-title":"Understanding and Interpreting Machine Learning in Medical Image Computing Applications","first-page":"133","article-title":"Towards complementary explanations using deep neural networks","author":"Silva","year":"2018"},{"key":"10.1016\/j.patrec.2024.06.014_b12","series-title":"2019 International Joint Conference on Neural Networks","first-page":"1","article-title":"How to produce complementary explanations using an ensemble model","author":"Silva","year":"2019"},{"key":"10.1016\/j.patrec.2024.06.014_b13","series-title":"2018 IEEE 5th International Conference on Data Science and Advanced Analytics","first-page":"80","article-title":"Explaining explanations: An overview of interpretability of machine learning","author":"Gilpin","year":"2018"},{"key":"10.1016\/j.patrec.2024.06.014_b14","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1109\/TIFS.2020.3013214","article-title":"Learning one class representations for face presentation attack detection using multi-channel convolutional neural networks","volume":"16","author":"George","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"10.1016\/j.patrec.2024.06.014_b15","doi-asserted-by":"crossref","first-page":"5450","DOI":"10.1109\/TIP.2019.2917862","article-title":"Learning deep features for one-class classification","volume":"28","author":"Perera","year":"2019","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.patrec.2024.06.014_b16","series-title":"2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems","first-page":"1","article-title":"Unknown presentation attack detection with face rgb images","author":"Xiong","year":"2018"},{"key":"10.1016\/j.patrec.2024.06.014_b17","series-title":"2021 IEEE Winter Conference on Applications of Computer Vision Workshops","first-page":"88","article-title":"Focused LRP: Explainable AI for face morphing attack detection","author":"Seibold","year":"2021"},{"key":"10.1016\/j.patrec.2024.06.014_b18","doi-asserted-by":"crossref","unstructured":"T. Zee, G. Gali, I. Nwogu, Enhancing human face recognition with an interpretable neural network, in: Proceedings of the IEEE\/CVF International Conference on Computer Vision Workshops, 2019.","DOI":"10.1109\/ICCVW.2019.00064"},{"key":"10.1016\/j.patrec.2024.06.014_b19","doi-asserted-by":"crossref","unstructured":"Z. Wang, Z. Yu, C. Zhao, X. Zhu, Y. Qin, Q. Zhou, F. Zhou, Z. Lei, Deep spatial gradient and temporal depth learning for face anti-spoofing, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 5042\u20135051.","DOI":"10.1109\/CVPR42600.2020.00509"},{"key":"10.1016\/j.patrec.2024.06.014_b20","doi-asserted-by":"crossref","unstructured":"Z. Yu, C. Zhao, Z. Wang, Y. Qin, Z. Su, X. Li, F. Zhou, G. Zhao, Searching central difference convolutional networks for face anti-spoofing, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 5295\u20135305.","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"10.1016\/j.patrec.2024.06.014_b21","doi-asserted-by":"crossref","unstructured":"R. Shao, X. Lan, P.C. Yuen, Regularized fine-grained meta face anti-spoofing, in: Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 34, 2020, pp. 11974\u201311981.","DOI":"10.1609\/aaai.v34i07.6873"},{"key":"10.1016\/j.patrec.2024.06.014_b22","series-title":"European Conference on Computer Vision","first-page":"406","article-title":"On disentangling spoof trace for generic face anti-spoofing","author":"Liu","year":"2020"},{"key":"10.1016\/j.patrec.2024.06.014_b23","doi-asserted-by":"crossref","unstructured":"X. Yang, W. Luo, L. Bao, Y. Gao, D. Gong, S. Zheng, Z. Li, W. Liu, Face anti-spoofing: Model matters, so does data, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 3507\u20133516.","DOI":"10.1109\/CVPR.2019.00362"},{"key":"10.1016\/j.patrec.2024.06.014_b24","doi-asserted-by":"crossref","unstructured":"A. Jourabloo, Y. Liu, X. Liu, Face de-spoofing: Anti-spoofing via noise modeling, in: Proceedings of the European Conference on Computer Vision, ECCV, 2018, pp. 290\u2013306.","DOI":"10.1007\/978-3-030-01261-8_18"},{"year":"2020","series-title":"Four principles of explainable ai as applied to biometrics and facial forensic algorithms","author":"Phillips","key":"10.1016\/j.patrec.2024.06.014_b25"},{"key":"10.1016\/j.patrec.2024.06.014_b26","doi-asserted-by":"crossref","unstructured":"C. Seibold, A. Hilsmann, P. Eisert, Focused lrp: Explainable ai for face morphing attack detection, in: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, 2021, pp. 88\u201396.","DOI":"10.1109\/WACVW52041.2021.00014"},{"issue":"7","key":"10.1016\/j.patrec.2024.06.014_b27","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0130140","article-title":"On pixel-wise explanations for non-linear classifier decisions by layer-wise relevance propagation","volume":"10","author":"Bach","year":"2015","journal-title":"PLoS One"},{"key":"10.1016\/j.patrec.2024.06.014_b28","series-title":"International Conference on Machine Learning","first-page":"6105","article-title":"Efficientnet: Rethinking model scaling for convolutional neural networks","author":"Tan","year":"2019"},{"year":"2017","series-title":"Face research lab London set","author":"DeBruine","key":"10.1016\/j.patrec.2024.06.014_b29"},{"key":"10.1016\/j.patrec.2024.06.014_b30","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/TIFS.2019.2916652","article-title":"Biometric face presentation attack detection with multi-channel convolutional neural network","volume":"15","author":"George","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.patrec.2024.06.014_b31","series-title":"2017 IEEE Int. Conference on Identity, Security and Behavior Analysis","first-page":"1","article-title":"Spoofing faces using makeup: An investigative study","author":"Chen","year":"2017"}],"container-title":["Pattern Recognition Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167865524001843?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167865524001843?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T19:51:44Z","timestamp":1731095504000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167865524001843"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8]]},"references-count":31,"alternative-id":["S0167865524001843"],"URL":"https:\/\/doi.org\/10.1016\/j.patrec.2024.06.014","relation":{},"ISSN":["0167-8655"],"issn-type":[{"type":"print","value":"0167-8655"}],"subject":[],"published":{"date-parts":[[2024,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"An efficient ensemble explainable AI (XAI) approach for morphed face detection","name":"articletitle","label":"Article Title"},{"value":"Pattern Recognition Letters","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.patrec.2024.06.014","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}]}}