
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Biometric Antispoofing Methods: A Survey in Face Recognition
Javier Galbally, Sébastien Marcel, Julián Fiérrez
IEEE Access (2014) Vol. 2, pp. 1530-1552
Open Access | Times Cited: 395
Javier Galbally, Sébastien Marcel, Julián Fiérrez
IEEE Access (2014) Vol. 2, pp. 1530-1552
Open Access | Times Cited: 395
Showing 26-50 of 395 citing articles:
Biometrics: Trust, But Verify
Anil K. Jain, Debayan Deb, Joshua J. Engelsma
IEEE Transactions on Biometrics Behavior and Identity Science (2021) Vol. 4, Iss. 3, pp. 303-323
Open Access | Times Cited: 78
Anil K. Jain, Debayan Deb, Joshua J. Engelsma
IEEE Transactions on Biometrics Behavior and Identity Science (2021) Vol. 4, Iss. 3, pp. 303-323
Open Access | Times Cited: 78
A Comprehensive Survey on ECG Signals as New Biometric Modality for Human Authentication: Recent Advances and Future Challenges
Anthony Ngozichukwuka Uwaechia, Dzati Athiar Ramli
IEEE Access (2021) Vol. 9, pp. 97760-97802
Open Access | Times Cited: 70
Anthony Ngozichukwuka Uwaechia, Dzati Athiar Ramli
IEEE Access (2021) Vol. 9, pp. 97760-97802
Open Access | Times Cited: 70
Attacks and defenses in user authentication systems: A survey
Xuerui Wang, Zheng Yan, Rui Zhang, et al.
Journal of Network and Computer Applications (2021) Vol. 188, pp. 103080-103080
Closed Access | Times Cited: 62
Xuerui Wang, Zheng Yan, Rui Zhang, et al.
Journal of Network and Computer Applications (2021) Vol. 188, pp. 103080-103080
Closed Access | Times Cited: 62
An overview of the existing and future state of the art advancement of hybrid energy systems based on PV-solar and wind
Manzoore Elahi M. Soudagar, S. Ramesh, T. M. Yunus Khan, et al.
International Journal of Low-Carbon Technologies (2024) Vol. 19, pp. 207-216
Open Access | Times Cited: 14
Manzoore Elahi M. Soudagar, S. Ramesh, T. M. Yunus Khan, et al.
International Journal of Low-Carbon Technologies (2024) Vol. 19, pp. 207-216
Open Access | Times Cited: 14
Multidimensional Deep Ultraviolet (DUV) Synapses Based on Organic/Perovskite Semiconductor Heterojunction Transistors for Antispoofing Facial Recognition Systems
Jiangnan Xia, Changsong Gao, Chung‐Kang Peng, et al.
Nano Letters (2024) Vol. 24, Iss. 22, pp. 6673-6682
Closed Access | Times Cited: 11
Jiangnan Xia, Changsong Gao, Chung‐Kang Peng, et al.
Nano Letters (2024) Vol. 24, Iss. 22, pp. 6673-6682
Closed Access | Times Cited: 11
PPGSecure: Biometric Presentation Attack Detection Using Photopletysmograms
Ewa M. Nowara, Ashutosh Sabharwal, Ashok Veeraraghavan
(2017), pp. 56-62
Closed Access | Times Cited: 75
Ewa M. Nowara, Ashutosh Sabharwal, Ashok Veeraraghavan
(2017), pp. 56-62
Closed Access | Times Cited: 75
SWAPPED! Digital face presentation attack detection via weighted local magnitude pattern
Akshay Agarwal, Richa Singh, Mayank Vatsa, et al.
(2017), pp. 659-665
Closed Access | Times Cited: 74
Akshay Agarwal, Richa Singh, Mayank Vatsa, et al.
(2017), pp. 659-665
Closed Access | Times Cited: 74
Discriminative representation combinations for accurate face spoofing detection
Xiao Song, Xu Zhao, Liangji Fang, et al.
Pattern Recognition (2018) Vol. 85, pp. 220-231
Open Access | Times Cited: 74
Xiao Song, Xu Zhao, Liangji Fang, et al.
Pattern Recognition (2018) Vol. 85, pp. 220-231
Open Access | Times Cited: 74
Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination
Le‐Bing Zhang, Fei Peng, Le Qin, et al.
Journal of Visual Communication and Image Representation (2018) Vol. 51, pp. 56-69
Closed Access | Times Cited: 70
Le‐Bing Zhang, Fei Peng, Le Qin, et al.
Journal of Visual Communication and Image Representation (2018) Vol. 51, pp. 56-69
Closed Access | Times Cited: 70
On the generalization of color texture-based face anti-spoofing
Zinelabidine Boulkenafet, Jukka Komulainen, Abdenour Hadid
Image and Vision Computing (2018) Vol. 77, pp. 1-9
Open Access | Times Cited: 70
Zinelabidine Boulkenafet, Jukka Komulainen, Abdenour Hadid
Image and Vision Computing (2018) Vol. 77, pp. 1-9
Open Access | Times Cited: 70
Impact and Detection of Facial Beautification in Face Recognition: An Overview
Christian Rathgeb, Antitza Dantcheva, Christoph Busch
IEEE Access (2019) Vol. 7, pp. 152667-152678
Open Access | Times Cited: 70
Christian Rathgeb, Antitza Dantcheva, Christoph Busch
IEEE Access (2019) Vol. 7, pp. 152667-152678
Open Access | Times Cited: 70
On the Robustness of Face Recognition Algorithms Against Attacks and Bias
Richa Singh, Akshay Agarwal, Maneet Singh, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2020) Vol. 34, Iss. 09, pp. 13583-13589
Open Access | Times Cited: 67
Richa Singh, Akshay Agarwal, Maneet Singh, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2020) Vol. 34, Iss. 09, pp. 13583-13589
Open Access | Times Cited: 67
Face recognition under spoofing attacks: countermeasures and research directions
Lei Li, Paulo Lobato Correia, Abdenour Hadid
IET Biometrics (2017) Vol. 7, Iss. 1, pp. 3-14
Closed Access | Times Cited: 66
Lei Li, Paulo Lobato Correia, Abdenour Hadid
IET Biometrics (2017) Vol. 7, Iss. 1, pp. 3-14
Closed Access | Times Cited: 66
Time Analysis of Pulse-Based Face Anti-Spoofing in Visible and NIR
Javier Hernandez‐Ortega, Julián Fiérrez, Aythami Morales, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2018), pp. 657-6578
Closed Access | Times Cited: 65
Javier Hernandez‐Ortega, Julián Fiérrez, Aythami Morales, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2018), pp. 657-6578
Closed Access | Times Cited: 65
Person identification using EEG channel selection with hybrid flower pollination algorithm
Zaid Abdi Alkareem Alyasseri, Ahamad Tajudin Khader, Mohammed Azmi Al‐Betar, et al.
Pattern Recognition (2020) Vol. 105, pp. 107393-107393
Closed Access | Times Cited: 65
Zaid Abdi Alkareem Alyasseri, Ahamad Tajudin Khader, Mohammed Azmi Al‐Betar, et al.
Pattern Recognition (2020) Vol. 105, pp. 107393-107393
Closed Access | Times Cited: 65
A comparative study on face spoofing attacks
Sandeep Kumar, Sukhwinder Singh, Jagdish Kumar
(2017)
Closed Access | Times Cited: 64
Sandeep Kumar, Sukhwinder Singh, Jagdish Kumar
(2017)
Closed Access | Times Cited: 64
Unknown Presentation Attack Detection with Face RGB Images
Fei Xiong, Wael AbdAlmageed
(2018), pp. 1-9
Closed Access | Times Cited: 59
Fei Xiong, Wael AbdAlmageed
(2018), pp. 1-9
Closed Access | Times Cited: 59
Recognizing Disguised Faces in the Wild
Maneet Singh, Richa Singh, Mayank Vatsa, et al.
IEEE Transactions on Biometrics Behavior and Identity Science (2019) Vol. 1, Iss. 2, pp. 97-108
Open Access | Times Cited: 59
Maneet Singh, Richa Singh, Mayank Vatsa, et al.
IEEE Transactions on Biometrics Behavior and Identity Science (2019) Vol. 1, Iss. 2, pp. 97-108
Open Access | Times Cited: 59
DeepFakesON-Phys: DeepFakes Detection based on Heart Rate Estimation
Javier Hernandez‐Ortega, Rubén Tolosana, Julián Fiérrez, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 52
Javier Hernandez‐Ortega, Rubén Tolosana, Julián Fiérrez, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 52
Fingerprint Presentation Attack Detection Based on Local Features Encoding for Unknown Attacks
Lázaro J. González‐Soler, Marta Gomez‐Barrero, Leonardo Chang, et al.
IEEE Access (2021) Vol. 9, pp. 5806-5820
Open Access | Times Cited: 50
Lázaro J. González‐Soler, Marta Gomez‐Barrero, Leonardo Chang, et al.
IEEE Access (2021) Vol. 9, pp. 5806-5820
Open Access | Times Cited: 50
A comprehensive survey and deep learning-based approach for human recognition using ear biometric
Aman Kamboj, Rajneesh Rani, Aditya Nigam
The Visual Computer (2021) Vol. 38, Iss. 7, pp. 2383-2416
Open Access | Times Cited: 49
Aman Kamboj, Rajneesh Rani, Aditya Nigam
The Visual Computer (2021) Vol. 38, Iss. 7, pp. 2383-2416
Open Access | Times Cited: 49
A survey on face presentation attack detection mechanisms: hitherto and future perspectives
Deepika Sharma, Arvind Selwal
Multimedia Systems (2023) Vol. 29, Iss. 3, pp. 1527-1577
Open Access | Times Cited: 16
Deepika Sharma, Arvind Selwal
Multimedia Systems (2023) Vol. 29, Iss. 3, pp. 1527-1577
Open Access | Times Cited: 16
A Survey Of mobile face biometrics
Ajita Rattani, Reza Derakhshani
Computers & Electrical Engineering (2018) Vol. 72, pp. 39-52
Closed Access | Times Cited: 54
Ajita Rattani, Reza Derakhshani
Computers & Electrical Engineering (2018) Vol. 72, pp. 39-52
Closed Access | Times Cited: 54
How far did we get in face spoofing detection?
Luiz Souza, Luciano Oliveira, Maurício Pamplona Segundo, et al.
Engineering Applications of Artificial Intelligence (2018) Vol. 72, pp. 368-381
Open Access | Times Cited: 53
Luiz Souza, Luciano Oliveira, Maurício Pamplona Segundo, et al.
Engineering Applications of Artificial Intelligence (2018) Vol. 72, pp. 368-381
Open Access | Times Cited: 53
Biometric Presentation Attack Detection: Beyond the Visible Spectrum
Rubén Tolosana, Marta Gomez‐Barrero, Christoph Busch, et al.
IEEE Transactions on Information Forensics and Security (2019) Vol. 15, pp. 1261-1275
Open Access | Times Cited: 53
Rubén Tolosana, Marta Gomez‐Barrero, Christoph Busch, et al.
IEEE Transactions on Information Forensics and Security (2019) Vol. 15, pp. 1261-1275
Open Access | Times Cited: 53