
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Recognizing Surgically Altered Face Images Using Multiobjective Evolutionary Algorithm
Hetvi Bhatt, S. Bharadwaj, Richa Singh, et al.
IEEE Transactions on Information Forensics and Security (2012) Vol. 8, Iss. 1, pp. 89-100
Closed Access | Times Cited: 117
Hetvi Bhatt, S. Bharadwaj, Richa Singh, et al.
IEEE Transactions on Information Forensics and Security (2012) Vol. 8, Iss. 1, pp. 89-100
Closed Access | Times Cited: 117
Showing 26-50 of 117 citing articles:
On Matching Faces with Alterations due to Plastic Surgery and Disguise
Saksham Suri, Anush Sankaran, Mayank Vatsa, et al.
(2018), pp. 1-7
Open Access | Times Cited: 20
Saksham Suri, Anush Sankaran, Mayank Vatsa, et al.
(2018), pp. 1-7
Open Access | Times Cited: 20
Selecting discriminative regions for periocular verification
Jonathon M. Smereka, B. V. K. Vijaya Kumar, Andrés Rodríguez
(2016), pp. 1-8
Closed Access | Times Cited: 19
Jonathon M. Smereka, B. V. K. Vijaya Kumar, Andrés Rodríguez
(2016), pp. 1-8
Closed Access | Times Cited: 19
Deep Belief Network and Auto-Encoder for Face Classification
Bouchra Nassih, Aouatif Amine, Mohammed Ngadi, et al.
International Journal of Interactive Multimedia and Artificial Intelligence (2018) Vol. 5, Iss. 5, pp. 22-22
Open Access | Times Cited: 19
Bouchra Nassih, Aouatif Amine, Mohammed Ngadi, et al.
International Journal of Interactive Multimedia and Artificial Intelligence (2018) Vol. 5, Iss. 5, pp. 22-22
Open Access | Times Cited: 19
Spatial Circular Granulation Method Based on Multimodal Finger Feature
Jinfeng Yang, Zhen Zhong, Guimin Jia, et al.
Journal of Electrical and Computer Engineering (2016) Vol. 2016, pp. 1-7
Open Access | Times Cited: 17
Jinfeng Yang, Zhen Zhong, Guimin Jia, et al.
Journal of Electrical and Computer Engineering (2016) Vol. 2016, pp. 1-7
Open Access | Times Cited: 17
Face Biometric Authentication System for ATM using Deep Learning
S. Ramya, R Sheeba, P Aravind, et al.
2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) (2022), pp. 1446-1451
Closed Access | Times Cited: 10
S. Ramya, R Sheeba, P Aravind, et al.
2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) (2022), pp. 1446-1451
Closed Access | Times Cited: 10
Recognizing Face Images with Disguise Variations
Neslihan Köse, Jean‐Luc Dugelay, Richa Singh, et al.
Advances in computational intelligence and robotics book series (2014), pp. 227-251
Closed Access | Times Cited: 18
Neslihan Köse, Jean‐Luc Dugelay, Richa Singh, et al.
Advances in computational intelligence and robotics book series (2014), pp. 227-251
Closed Access | Times Cited: 18
Recognition of surgically altered face images: an empirical analysis on recent advances
Tanupreet Sabharwal, Rashmi Gupta, Lê Hoàng Sơn, et al.
Artificial Intelligence Review (2018) Vol. 52, Iss. 2, pp. 1009-1040
Closed Access | Times Cited: 17
Tanupreet Sabharwal, Rashmi Gupta, Lê Hoàng Sơn, et al.
Artificial Intelligence Review (2018) Vol. 52, Iss. 2, pp. 1009-1040
Closed Access | Times Cited: 17
Cosmetic Detection Framework for Face and Iris Biometrics
Omid Sharifi, Maryam Eskandarı
Symmetry (2018) Vol. 10, Iss. 4, pp. 122-122
Open Access | Times Cited: 15
Omid Sharifi, Maryam Eskandarı
Symmetry (2018) Vol. 10, Iss. 4, pp. 122-122
Open Access | Times Cited: 15
Illumination normalization techniques for makeup-invariant face recognition
Usman Saeed, Khalid Masood, Hussain Dawood
Computers & Electrical Engineering (2020) Vol. 89, pp. 106921-106921
Closed Access | Times Cited: 13
Usman Saeed, Khalid Masood, Hussain Dawood
Computers & Electrical Engineering (2020) Vol. 89, pp. 106921-106921
Closed Access | Times Cited: 13
Deep facial recognition after medical alterations
Tanupreet Sabharwal, Rashmi Gupta
Multimedia Tools and Applications (2022) Vol. 81, Iss. 18, pp. 25675-25706
Closed Access | Times Cited: 8
Tanupreet Sabharwal, Rashmi Gupta
Multimedia Tools and Applications (2022) Vol. 81, Iss. 18, pp. 25675-25706
Closed Access | Times Cited: 8
Bridging the Gap Between Forensics and Biometric-Enabled Watchlists for e-Borders
Kenneth Lai, Svetlana Yanushkevich, Vlad P. Shmerko, et al.
IEEE Computational Intelligence Magazine (2017) Vol. 12, Iss. 1, pp. 16-28
Closed Access | Times Cited: 14
Kenneth Lai, Svetlana Yanushkevich, Vlad P. Shmerko, et al.
IEEE Computational Intelligence Magazine (2017) Vol. 12, Iss. 1, pp. 16-28
Closed Access | Times Cited: 14
Face recognition via edge-based Gabor feature representation for plastic surgery-altered images
Chollette C. Chude-Olisah, Ghazali Sulong, Uche A. K. Chude‐Okonkwo, et al.
EURASIP Journal on Advances in Signal Processing (2014) Vol. 2014, Iss. 1
Open Access | Times Cited: 13
Chollette C. Chude-Olisah, Ghazali Sulong, Uche A. K. Chude‐Okonkwo, et al.
EURASIP Journal on Advances in Signal Processing (2014) Vol. 2014, Iss. 1
Open Access | Times Cited: 13
Human identification after plastic surgery using region based score level fusion of local facial features
Tanupreet Sabharwal, Rashmi Gupta
Journal of Information Security and Applications (2019) Vol. 48, pp. 102373-102373
Closed Access | Times Cited: 13
Tanupreet Sabharwal, Rashmi Gupta
Journal of Information Security and Applications (2019) Vol. 48, pp. 102373-102373
Closed Access | Times Cited: 13
Plastic Surgery: An Obstacle for Deep Face Recognition?
Christian Rathgeb, Dogan Didem, Fabian Stockhardt, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2020), pp. 3510-3517
Closed Access | Times Cited: 12
Christian Rathgeb, Dogan Didem, Fabian Stockhardt, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2020), pp. 3510-3517
Closed Access | Times Cited: 12
Recognition of plastic surgery faces and the surgery types: An approach with entropy based scale invariant features
Archana Harsing Sable, Sanjay N. Talbar, Haricharan Amarsing Dhirbasi
Journal of King Saud University - Computer and Information Sciences (2017) Vol. 31, Iss. 4, pp. 554-560
Open Access | Times Cited: 12
Archana Harsing Sable, Sanjay N. Talbar, Haricharan Amarsing Dhirbasi
Journal of King Saud University - Computer and Information Sciences (2017) Vol. 31, Iss. 4, pp. 554-560
Open Access | Times Cited: 12
Score-Level-based Face Anti-Spoofing System Using Handcrafted and Deep Learned Characteristics
Omid Sharifi
International Journal of Image Graphics and Signal Processing (2019) Vol. 11, Iss. 2, pp. 15-20
Open Access | Times Cited: 11
Omid Sharifi
International Journal of Image Graphics and Signal Processing (2019) Vol. 11, Iss. 2, pp. 15-20
Open Access | Times Cited: 11
Facial marks for enhancing facial recognition after plastic surgery
Tanupreet Sabharwal, Rashmi Gupta
International Journal of Information Technology (2020) Vol. 13, Iss. 1, pp. 391-396
Closed Access | Times Cited: 11
Tanupreet Sabharwal, Rashmi Gupta
International Journal of Information Technology (2020) Vol. 13, Iss. 1, pp. 391-396
Closed Access | Times Cited: 11
Novel Biometric ATM User Authentication and Real-Time Secure Clickbait for Multi-Bank Transactions
D. Ferlin Deva Shahila, Banu Priya Prathaban, Valantina Stephen, et al.
(2023), pp. 1-7
Closed Access | Times Cited: 3
D. Ferlin Deva Shahila, Banu Priya Prathaban, Valantina Stephen, et al.
(2023), pp. 1-7
Closed Access | Times Cited: 3
Biometric‐enabled watchlists technology
Kenneth Lai, Ondřej Kanich, Michal Dvořák, et al.
IET Biometrics (2017) Vol. 7, Iss. 2, pp. 163-172
Closed Access | Times Cited: 9
Kenneth Lai, Ondřej Kanich, Michal Dvořák, et al.
IET Biometrics (2017) Vol. 7, Iss. 2, pp. 163-172
Closed Access | Times Cited: 9
An Adaptive Entropy Based Scale Invariant Face Recognition Face Altered by Plastic Surgery
Archana Harsing Sable, Sanjay N. Talbar
Pattern Recognition and Image Analysis (2018) Vol. 28, Iss. 4, pp. 813-829
Closed Access | Times Cited: 9
Archana Harsing Sable, Sanjay N. Talbar
Pattern Recognition and Image Analysis (2018) Vol. 28, Iss. 4, pp. 813-829
Closed Access | Times Cited: 9
A Face Recognition System Based on Back Propagation Neural Network Using Haar Wavelet Transform and Morphology
K. S. Gautam, Nadira Quadri, Abhinav Pareek, et al.
Lecture notes in electrical engineering (2014), pp. 87-94
Closed Access | Times Cited: 8
K. S. Gautam, Nadira Quadri, Abhinav Pareek, et al.
Lecture notes in electrical engineering (2014), pp. 87-94
Closed Access | Times Cited: 8
Implications of Applying New Technology in Cosmetic and Reconstructive Facial Plastic Surgery
Uneeb Qureshi, Shannon Calaguas, Ethan Frank, et al.
Facial Plastic Surgery (2020) Vol. 36, Iss. 06, pp. 760-767
Closed Access | Times Cited: 8
Uneeb Qureshi, Shannon Calaguas, Ethan Frank, et al.
Facial Plastic Surgery (2020) Vol. 36, Iss. 06, pp. 760-767
Closed Access | Times Cited: 8
Local plastic surgery-based face recognition using convolutional neural networks
Roshni S. Khedgaonkar, Kavita Singh, M. M. Raghuwanshi
Elsevier eBooks (2021), pp. 215-246
Closed Access | Times Cited: 8
Roshni S. Khedgaonkar, Kavita Singh, M. M. Raghuwanshi
Elsevier eBooks (2021), pp. 215-246
Closed Access | Times Cited: 8
Edge-based representation and recognition for surgically altered face images
Chollette C. Chude-Olisah, Ghazali Sulong, Uche A. K. Chude‐Okonkwo, et al.
(2013), pp. 1-7
Closed Access | Times Cited: 8
Chollette C. Chude-Olisah, Ghazali Sulong, Uche A. K. Chude‐Okonkwo, et al.
(2013), pp. 1-7
Closed Access | Times Cited: 8
Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme
Haoyang Wang, Kai Fan, Hongyan Chen, et al.
IEEE Transactions on Dependable and Secure Computing (2022), pp. 1-16
Closed Access | Times Cited: 5
Haoyang Wang, Kai Fan, Hongyan Chen, et al.
IEEE Transactions on Dependable and Secure Computing (2022), pp. 1-16
Closed Access | Times Cited: 5