
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Biometric Antispoofing Methods: A Survey in Face Recognition
Javier Galbally, Sébastien Marcel, Julián Fiérrez
IEEE Access (2014) Vol. 2, pp. 1530-1552
Open Access | Times Cited: 395
Javier Galbally, Sébastien Marcel, Julián Fiérrez
IEEE Access (2014) Vol. 2, pp. 1530-1552
Open Access | Times Cited: 395
Showing 1-25 of 395 citing articles:
Deepfakes and beyond: A Survey of face manipulation and fake detection
Rubén Tolosana, Rubén Vera-Rodríguez, Julián Fiérrez, et al.
Information Fusion (2020) Vol. 64, pp. 131-148
Open Access | Times Cited: 741
Rubén Tolosana, Rubén Vera-Rodríguez, Julián Fiérrez, et al.
Information Fusion (2020) Vol. 64, pp. 131-148
Open Access | Times Cited: 741
Face Spoofing Detection Using Colour Texture Analysis
Zinelabidine Boulkenafet, Jukka Komulainen, Abdenour Hadid
IEEE Transactions on Information Forensics and Security (2016) Vol. 11, Iss. 8, pp. 1818-1830
Closed Access | Times Cited: 526
Zinelabidine Boulkenafet, Jukka Komulainen, Abdenour Hadid
IEEE Transactions on Information Forensics and Security (2016) Vol. 11, Iss. 8, pp. 1818-1830
Closed Access | Times Cited: 526
OULU-NPU: A Mobile Face Presentation Attack Database with Real-World Variations
Zinelabinde Boulkenafet, Jukka Komulainen, Lei Li, et al.
(2017)
Open Access | Times Cited: 505
Zinelabinde Boulkenafet, Jukka Komulainen, Lei Li, et al.
(2017)
Open Access | Times Cited: 505
Secure Face Unlock: Spoof Detection on Smartphones
Keyurkumar J. Patel, Hu Han, Anil K. Jain
IEEE Transactions on Information Forensics and Security (2016) Vol. 11, Iss. 10, pp. 2268-2283
Closed Access | Times Cited: 460
Keyurkumar J. Patel, Hu Han, Anil K. Jain
IEEE Transactions on Information Forensics and Security (2016) Vol. 11, Iss. 10, pp. 2268-2283
Closed Access | Times Cited: 460
Presentation Attack Detection Methods for Face Recognition Systems
Raghavendra Ramachandra, Christoph Busch
ACM Computing Surveys (2017) Vol. 50, Iss. 1, pp. 1-37
Closed Access | Times Cited: 292
Raghavendra Ramachandra, Christoph Busch
ACM Computing Surveys (2017) Vol. 50, Iss. 1, pp. 1-37
Closed Access | Times Cited: 292
Face Anti-Spoofing using Speeded-Up Robust Features and Fisher Vector Encoding
Zinelabidine Boulkenafet, Jukka Komulainen, Abdenour Hadid
IEEE Signal Processing Letters (2016), pp. 1-1
Open Access | Times Cited: 270
Zinelabidine Boulkenafet, Jukka Komulainen, Abdenour Hadid
IEEE Signal Processing Letters (2016), pp. 1-1
Open Access | Times Cited: 270
Integration of image quality and motion cues for face anti-spoofing: A neural network approach
Litong Feng, Lai-Man Po, Yuming Li, et al.
Journal of Visual Communication and Image Representation (2016) Vol. 38, pp. 451-460
Closed Access | Times Cited: 258
Litong Feng, Lai-Man Po, Yuming Li, et al.
Journal of Visual Communication and Image Representation (2016) Vol. 38, pp. 451-460
Closed Access | Times Cited: 258
Identification of deep network generated images using disparities in color components
Haodong Li, Bin Li, Shunquan Tan, et al.
Signal Processing (2020) Vol. 174, pp. 107616-107616
Open Access | Times Cited: 212
Haodong Li, Bin Li, Shunquan Tan, et al.
Signal Processing (2020) Vol. 174, pp. 107616-107616
Open Access | Times Cited: 212
Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned
Abdenour Hadid, Nicholas Evans, Sébastien Marcel, et al.
IEEE Signal Processing Magazine (2015) Vol. 32, Iss. 5, pp. 20-30
Open Access | Times Cited: 201
Abdenour Hadid, Nicholas Evans, Sébastien Marcel, et al.
IEEE Signal Processing Magazine (2015) Vol. 32, Iss. 5, pp. 20-30
Open Access | Times Cited: 201
Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes
Allan Pinto, Hélio Pedrini, William Robson Schwartz, et al.
IEEE Transactions on Image Processing (2015) Vol. 24, Iss. 12, pp. 4726-4740
Closed Access | Times Cited: 189
Allan Pinto, Hélio Pedrini, William Robson Schwartz, et al.
IEEE Transactions on Image Processing (2015) Vol. 24, Iss. 12, pp. 4726-4740
Closed Access | Times Cited: 189
A comprehensive overview of biometric fusion
Maneet Singh, Richa Singh, Arun Ross
Information Fusion (2019) Vol. 52, pp. 187-205
Open Access | Times Cited: 189
Maneet Singh, Richa Singh, Arun Ross
Information Fusion (2019) Vol. 52, pp. 187-205
Open Access | Times Cited: 189
Face recognition: Past, present and future (a review)
Murat Taşkıran, Nihan Kahraman, Çiğdem Eroğlu Erdem
Digital Signal Processing (2020) Vol. 106, pp. 102809-102809
Open Access | Times Cited: 169
Murat Taşkıran, Nihan Kahraman, Çiğdem Eroğlu Erdem
Digital Signal Processing (2020) Vol. 106, pp. 102809-102809
Open Access | Times Cited: 169
GANprintR: Improved Fakes and Evaluation of the State of the Art in Face Manipulation Detection
João C. Neves, Rubén Tolosana, Rubén Vera-Rodríguez, et al.
IEEE Journal of Selected Topics in Signal Processing (2020) Vol. 14, Iss. 5, pp. 1038-1048
Open Access | Times Cited: 151
João C. Neves, Rubén Tolosana, Rubén Vera-Rodríguez, et al.
IEEE Journal of Selected Topics in Signal Processing (2020) Vol. 14, Iss. 5, pp. 1038-1048
Open Access | Times Cited: 151
DeepFake Detection for Human Face Images and Videos: A Survey
Asad Malik, Minoru Kuribayashi, Sani M. Abdullahi, et al.
IEEE Access (2022) Vol. 10, pp. 18757-18775
Open Access | Times Cited: 103
Asad Malik, Minoru Kuribayashi, Sani M. Abdullahi, et al.
IEEE Access (2022) Vol. 10, pp. 18757-18775
Open Access | Times Cited: 103
Face Image Quality Assessment: A Literature Survey
Torsten Schlett, Christian Rathgeb, Olaf Henniger, et al.
ACM Computing Surveys (2022) Vol. 54, Iss. 10s, pp. 1-49
Open Access | Times Cited: 92
Torsten Schlett, Christian Rathgeb, Olaf Henniger, et al.
ACM Computing Surveys (2022) Vol. 54, Iss. 10s, pp. 1-49
Open Access | Times Cited: 92
Generalized face anti-spoofing by detecting pulse from face videos
Xiaobai Li, Jukka Komulainen, Guoying Zhao, et al.
(2016), pp. 4244-4249
Open Access | Times Cited: 161
Xiaobai Li, Jukka Komulainen, Guoying Zhao, et al.
(2016), pp. 4244-4249
Open Access | Times Cited: 161
Transfer Learning Using Convolutional Neural Networks for Face Anti-spoofing
Oeslle Lucena, A. Machado Júnior, Vitor Hugo Galhardo Moia, et al.
Lecture notes in computer science (2017), pp. 27-34
Closed Access | Times Cited: 129
Oeslle Lucena, A. Machado Júnior, Vitor Hugo Galhardo Moia, et al.
Lecture notes in computer science (2017), pp. 27-34
Closed Access | Times Cited: 129
Digital image integrity – a survey of protection and verification techniques
Paweł Korus
Digital Signal Processing (2017) Vol. 71, pp. 1-26
Closed Access | Times Cited: 129
Paweł Korus
Digital Signal Processing (2017) Vol. 71, pp. 1-26
Closed Access | Times Cited: 129
Unsupervised Adversarial Domain Adaptation for Cross-Domain Face Presentation Attack Detection
Guoqing Wang, Hu Han, Shiguang Shan, et al.
IEEE Transactions on Information Forensics and Security (2020) Vol. 16, pp. 56-69
Closed Access | Times Cited: 117
Guoqing Wang, Hu Han, Shiguang Shan, et al.
IEEE Transactions on Information Forensics and Security (2020) Vol. 16, pp. 56-69
Closed Access | Times Cited: 117
Joint Discriminative Learning of Deep Dynamic Textures for 3D Mask Face Anti-Spoofing
Rui Shao, Xiangyuan Lan, Pong C. Yuen
IEEE Transactions on Information Forensics and Security (2018) Vol. 14, Iss. 4, pp. 923-938
Closed Access | Times Cited: 99
Rui Shao, Xiangyuan Lan, Pong C. Yuen
IEEE Transactions on Information Forensics and Security (2018) Vol. 14, Iss. 4, pp. 923-938
Closed Access | Times Cited: 99
LiveNet: Improving features generalization for face liveness detection using convolution neural networks
Yasar Abbas Ur Rehman, Lai-Man Po, Mengyang Liu
Expert Systems with Applications (2018) Vol. 108, pp. 159-169
Closed Access | Times Cited: 88
Yasar Abbas Ur Rehman, Lai-Man Po, Mengyang Liu
Expert Systems with Applications (2018) Vol. 108, pp. 159-169
Closed Access | Times Cited: 88
A survey on 3D mask presentation attack detection and countermeasures
Shan Jia, Guodong Guo, Zhengquan Xu
Pattern Recognition (2019) Vol. 98, pp. 107032-107032
Closed Access | Times Cited: 87
Shan Jia, Guodong Guo, Zhengquan Xu
Pattern Recognition (2019) Vol. 98, pp. 107032-107032
Closed Access | Times Cited: 87
Deep Models and Shortwave Infrared Information to Detect Face Presentation Attacks
Guillaume Heusch, Anjith George, David Geissbühler, et al.
IEEE Transactions on Biometrics Behavior and Identity Science (2020) Vol. 2, Iss. 4, pp. 399-409
Open Access | Times Cited: 87
Guillaume Heusch, Anjith George, David Geissbühler, et al.
IEEE Transactions on Biometrics Behavior and Identity Science (2020) Vol. 2, Iss. 4, pp. 399-409
Open Access | Times Cited: 87
A Performance Evaluation of Convolutional Neural Networks for Face Anti Spoofing
Chaitanya Nagpal, Shiv Ram Dubey
2022 International Joint Conference on Neural Networks (IJCNN) (2019)
Open Access | Times Cited: 86
Chaitanya Nagpal, Shiv Ram Dubey
2022 International Joint Conference on Neural Networks (IJCNN) (2019)
Open Access | Times Cited: 86
Advances in anti-spoofing: from the perspective of ASVspoof challenges
Madhu R. Kamble, Hardik B. Sailor, Hemant A. Patil, et al.
APSIPA Transactions on Signal and Information Processing (2020) Vol. 9, Iss. 1
Open Access | Times Cited: 78
Madhu R. Kamble, Hardik B. Sailor, Hemant A. Patil, et al.
APSIPA Transactions on Signal and Information Processing (2020) Vol. 9, Iss. 1
Open Access | Times Cited: 78