OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli
Yongtuo Zhang, Wen Hu, Weitao Xu, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2018) Vol. 1, Iss. 4, pp. 1-22
Closed Access | Times Cited: 71

Showing 51-75 of 71 citing articles:

Prediction of Oblique Saccade Trajectories Using Learned Velocity Profile Parameter Mappings
Henry Griffith, Samantha Aziz, Oleg V. Komogortsev
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) (2020), pp. 0018-0024
Closed Access | Times Cited: 4

Presentation attack detection and biometric recognition in a challenge-response formalism
Erwin Haasnoot, Luuk Spreeuwers, Raymond Veldhuis
EURASIP Journal on Information Security (2022) Vol. 2022, Iss. 1
Open Access | Times Cited: 3

SonicID: User Identification on Smart Glasses with Acoustic Sensing
Ke Li, Devansh Agarwal, Ruidong Zhang, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2024) Vol. 8, Iss. 4, pp. 1-27
Open Access

Medusa3D: The Watchful Eye Freezing Illegitimate Users in Virtual Reality Interactions
Aochen Jiao, Di Duan, Weitao Xu
Proceedings of the ACM on Human-Computer Interaction (2024) Vol. 8, Iss. MHCI, pp. 1-21
Closed Access

A Traceable Continuous Authentication Scheme for Avatars in Large-Scale Commercial Activities
Kedi Yang, Zhenyong Zhang, Youliang Tian, et al.
IEEE Internet of Things Journal (2024) Vol. 12, Iss. 5, pp. 5194-5206
Closed Access

Cross-content User Authentication in Virtual Reality
Wenda Shao, S D Luo, Zhisheng Yan
Proceedings of the 28th Annual International Conference on Mobile Computing And Networking (2024), pp. 2098-2105
Open Access

IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks
Meng Shen, Zelin Liao, Liehuang Zhu, et al.
arXiv (Cornell University) (2018)
Open Access | Times Cited: 3

Act2Auth – A Novel Authentication Concept based on Embedded Tangible Interaction at Desks
Sarah Delgado Rodriguez, Sarah Prange, Lukas Mecke, et al.
(2024), pp. 1-15
Closed Access

Uniss-FGD: A Novel Dataset of Human Gazes Over Images of Faces
Pietro Ruiu, Mauro Fadda, Andrea Lagorio, et al.
IEEE Access (2024) Vol. 12, pp. 75951-75964
Open Access

Exploring Redirection and Shifting Techniques to Mask Hand Movements from Shoulder-Surfing Attacks during PIN Authentication in Virtual Reality
Yannick Weiß, Steeven Villa, Jesse W. Grootjen, et al.
Proceedings of the ACM on Human-Computer Interaction (2024) Vol. 8, Iss. MHCI, pp. 1-24
Closed Access

Sustainable Construction of Higher Education MOOCs Using CNN Feature Extraction
Yongyan Zhao, Jian Li
International Journal of Web-Based Learning and Teaching Technologies (2024) Vol. 19, Iss. 1, pp. 1-13
Open Access

Eye Tracking Data Collection Protocol for VR for Remotely Located Subjects using Blockchain and Smart Contracts
Efe Bozkir, Shahram Eivazi, Mete Akgün, et al.
(2020), pp. 397-401
Open Access | Times Cited: 3

Using Pupil Light Reflex for Fast Biometric Authentication
Shilin Yan, Shan Chang, Jiacheng Wang, et al.
Proceedings of the ACM Turing Celebration Conference - China (2020), pp. 139-143
Closed Access | Times Cited: 3

TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High Accuracy
Jie Ying, Tiantian Zhu, Qiang Liu, et al.
IEEE Transactions on Mobile Computing (2023) Vol. 23, Iss. 4, pp. 2832-2848
Closed Access | Times Cited: 1

WoX+: A Meta-Model-Driven Approach to Mine User Habits and Provide Continuous Authentication in the Smart City
Luca Mainetti, Paolo Panarese, Roberto Vergallo
Sensors (2022) Vol. 22, Iss. 18, pp. 6980-6980
Open Access | Times Cited: 2

Protecting from Lunchtime Attack Using an Uncalibrated Eye Tracker Signal
Paweł Kasprowski, Katarzyna Harężlak
ACM Symposium on Eye Tracking Research and Applications (2020) Vol. 1, pp. 1-5
Closed Access | Times Cited: 2

Multimodal Context-Based Continuous Authentication
Saandeep Aathreya, Meghna Chaudhary, Tempestt Neal, et al.
(2023), pp. 1-10
Closed Access

Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey
Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, et al.
arXiv (Cornell University) (2020)
Closed Access

A Novel Quality Assessment Method for Eye Movement Authentication
Narishige Abe, Shigefumi Yamada
Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (2020), pp. 1430-1435
Closed Access

Sensor Data Normalization Among Heterogeneous Smartphones for Implicit Authentication
Zuodong Jin, Muyan Yao, Dan Tao
Lecture notes in computer science (2022), pp. 331-345
Closed Access

Previous Page - Page 3

Scroll to top