OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Survey on Biometric Authentication: Toward Secure and Privacy-Preserving Identification
Rui Zhang, Zheng Yan
IEEE Access (2018) Vol. 7, pp. 5994-6009
Open Access | Times Cited: 213

Showing 26-50 of 213 citing articles:

A review of privacy-preserving biometric identification and authentication protocols
Li Zeng, Peisong Shen, Xiaojie Zhu, et al.
Computers & Security (2025), pp. 104309-104309
Closed Access

Biometric Privacy
Stelvio Cimato, Roberto Sassi, Fabio Scotti
(2025), pp. 205-209
Closed Access

Multimodal Secure Biometrics using Attention Efficient-Net Hash Compression Framework
T.S. Sasikala
Digital Signal Processing (2025), pp. 105018-105018
Closed Access

A Review on Secure Authentication Mechanisms for Mobile Security
Syed Shabih Hasan, Anwar Ghani, Ali Daud, et al.
Sensors (2025) Vol. 25, Iss. 3, pp. 700-700
Open Access

BRILLO: Personalised HRI with a Bartender Robot
Alessandra Rossi, Silvia Rossi, Maria Di Maro, et al.
International Journal of Social Robotics (2025)
Open Access

Financial Evolution
Pedro David, Joel Jebadurai Devapitchai, D. Chris Sherin, et al.
Advances in finance, accounting, and economics book series (2025), pp. 45-72
Closed Access

Novel Deep Learning-Based Facial Forgery Detection for Effective Biometric Recognition
Han‐Soo Kim
Applied Sciences (2025) Vol. 15, Iss. 7, pp. 3613-3613
Open Access

Multimodal Biometric Recognition Using Fuzzified BTC with a Novel Hybrid JSO-CSO Algorithm
Indu Singh, Shubhani Aggarwal, Shrey Gupta, et al.
Communications in computer and information science (2025), pp. 210-223
Closed Access

Anonymization Techniques for Behavioral Biometric Data: A Survey
Simon Hanisch, Patricia Arias-Cabarcos, Javier Parra‐Arnau, et al.
ACM Computing Surveys (2025)
Closed Access

AGE: authentication in gadget-free healthcare environments
Tanesh Kumar, An Braeken, Anca Delia Jurcut, et al.
Information Technology and Management (2019) Vol. 21, Iss. 2, pp. 95-114
Open Access | Times Cited: 30

Cancelable ECG biometric based on combination of deep transfer learning with DNA and amino acid approaches for human authentication
Ahmed Sakr, Paweł Pławiak, Ryszard Tadeusiewicz, et al.
Information Sciences (2021) Vol. 585, pp. 127-143
Open Access | Times Cited: 25

Adversarial attacks and defenses in Speaker Recognition Systems: A survey
Jiahe Lan, Rui Zhang, Zheng Yan, et al.
Journal of Systems Architecture (2022) Vol. 127, pp. 102526-102526
Open Access | Times Cited: 17

A two stream face anti-spoofing framework using multi-level deep features and ELBP features
Aashania Antil, Chhavi Dhiman
Multimedia Systems (2023) Vol. 29, Iss. 3, pp. 1361-1376
Closed Access | Times Cited: 9

Deep learning based authentication schemes for smart devices in different modalities: progress, challenges, performance, datasets and future directions
Shailendra W. Shende, Jitendra V. Tembhurne, Nishat Afshan Ansari
Multimedia Tools and Applications (2024) Vol. 83, Iss. 28, pp. 71451-71493
Closed Access | Times Cited: 3

Deep Learning for Consumer Devices and Services 2—AI Gets Embedded at the Edge
Peter Corcoran, Joseph Lemley, Claudia Costache, et al.
IEEE Consumer Electronics Magazine (2019) Vol. 8, Iss. 5, pp. 10-19
Closed Access | Times Cited: 27

Risk-Driven Behavioral Biometric-based One-Shot-cum-Continuous User Authentication Scheme
Attaullah Buriro, Sandeep Gupta, Artsiom Yautsiukhin, et al.
Journal of Signal Processing Systems (2021) Vol. 93, Iss. 9, pp. 989-1006
Closed Access | Times Cited: 22

A Secure and Efficient Biometric Template Protection Scheme for Palmprint Recognition System
Alamgir Sardar, Saiyed Umer, Ranjeet Kumar Rout, et al.
IEEE Transactions on Artificial Intelligence (2022) Vol. 4, Iss. 5, pp. 1051-1063
Closed Access | Times Cited: 15

U-WeAr: User Recognition on Wearable Devices through Arm Gesture
Simone Bianco, Paolo Napoletano, Alberto Raimondi, et al.
IEEE Transactions on Human-Machine Systems (2022) Vol. 52, Iss. 4, pp. 713-724
Closed Access | Times Cited: 15

EEG-based Biometric Authentication Using Machine Learning: A Comprehensive Survey
Tarik Bin Shams, Md. Sakir Hossain, Md. Firoz Mahmud, et al.
ECTI Transactions on Electrical Engineering Electronics and Communications (2022) Vol. 20, Iss. 2, pp. 225-241
Open Access | Times Cited: 14

An Identity-Based Elliptic Curve Cryptography for Mobile Payment Security
Olufunke Rebecca Vincent, T. M. Okediran, Adebayo Abayomi‐Alli, et al.
SN Computer Science (2020) Vol. 1, Iss. 2
Open Access | Times Cited: 22

A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication
Muath Obaidat, Joseph M. Brown, Suhaib Obeidat, et al.
Sensors (2020) Vol. 20, Iss. 15, pp. 4212-4212
Open Access | Times Cited: 21

Ensuring Academic Integrity and Trust in Online Learning Environments: A Longitudinal Study of an AI-Centered Proctoring System in Tertiary Educational Institutions
Christos Fidas, Marios Belk, Argyris Constantinides, et al.
Education Sciences (2023) Vol. 13, Iss. 6, pp. 566-566
Open Access | Times Cited: 7

Online Banking User Authentication Methods: A Systematic Literature Review
Nader Abdel Karim, Osama A. Khashan, Hasan Kanaker, et al.
IEEE Access (2023) Vol. 12, pp. 741-757
Open Access | Times Cited: 7

Recent Trends of Authentication Methods in Extended Reality: A Survey
Louisa Hallal, Jason Rhinelander, Ramesh Venkat
Applied System Innovation (2024) Vol. 7, Iss. 3, pp. 45-45
Open Access | Times Cited: 2

A Comprehensive Risk Analysis Method for Adversarial Attacks on Biometric Authentication Systems
S. H. Park, Soo-Hyun Lee, Min Young Lim, et al.
IEEE Access (2024) Vol. 12, pp. 116693-116710
Open Access | Times Cited: 2

Scroll to top