
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Fingerprint Spoofing Detection to Improve Customer Security in Mobile Financial Applications Using Deep Learning
Shefali Arora, M. P. S. Bhatia
Arabian Journal for Science and Engineering (2019) Vol. 45, Iss. 4, pp. 2847-2863
Closed Access | Times Cited: 29
Shefali Arora, M. P. S. Bhatia
Arabian Journal for Science and Engineering (2019) Vol. 45, Iss. 4, pp. 2847-2863
Closed Access | Times Cited: 29
Showing 1-25 of 29 citing articles:
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
Kashif Shaheed, Piotr Szczuko, Munish Kumar, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 129, pp. 107569-107569
Closed Access | Times Cited: 26
Kashif Shaheed, Piotr Szczuko, Munish Kumar, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 129, pp. 107569-107569
Closed Access | Times Cited: 26
Bank Fraud Detection using Community Detection Algorithm
Dhiman Sarma, Wahidul Alam, Ishita Saha, et al.
2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA) (2020), pp. 642-646
Closed Access | Times Cited: 42
Dhiman Sarma, Wahidul Alam, Ishita Saha, et al.
2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA) (2020), pp. 642-646
Closed Access | Times Cited: 42
Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication
Sara Kokal, Mounika Vanamala, Rushit Dave
Journal of Cybersecurity and Privacy (2023) Vol. 3, Iss. 2, pp. 227-258
Open Access | Times Cited: 16
Sara Kokal, Mounika Vanamala, Rushit Dave
Journal of Cybersecurity and Privacy (2023) Vol. 3, Iss. 2, pp. 227-258
Open Access | Times Cited: 16
Analysis of Data from Wearable Sensors for Sleep Quality Estimation and Prediction Using Deep Learning
Anshika Arora, Pinaki Chakraborty, M. P. S. Bhatia
Arabian Journal for Science and Engineering (2020) Vol. 45, Iss. 12, pp. 10793-10812
Closed Access | Times Cited: 37
Anshika Arora, Pinaki Chakraborty, M. P. S. Bhatia
Arabian Journal for Science and Engineering (2020) Vol. 45, Iss. 12, pp. 10793-10812
Closed Access | Times Cited: 37
MoSFPAD: An end-to-end ensemble of MobileNet and Support Vector Classifier for fingerprint presentation attack detection
Anuj Rai, Somnath Dey, Pradeep Patidar, et al.
Computers & Security (2024) Vol. 148, pp. 104069-104069
Open Access | Times Cited: 4
Anuj Rai, Somnath Dey, Pradeep Patidar, et al.
Computers & Security (2024) Vol. 148, pp. 104069-104069
Open Access | Times Cited: 4
Challenges and opportunities in biometric security: A survey
Shefali Arora, M. P. S. Bhatia
Information Security Journal A Global Perspective (2021) Vol. 31, Iss. 1, pp. 28-48
Closed Access | Times Cited: 24
Shefali Arora, M. P. S. Bhatia
Information Security Journal A Global Perspective (2021) Vol. 31, Iss. 1, pp. 28-48
Closed Access | Times Cited: 24
Evaluasi Keamanan Sistem Autentikasi Biometrik pada Smartphone dan Rekomendasi Implementasi Optimal
Felix Yeovandi, Sabariman Sabariman, Stefanus Eko Prasetyo
JTIM Jurnal Teknologi Informasi dan Multimedia (2025) Vol. 7, Iss. 1, pp. 133-148
Open Access
Felix Yeovandi, Sabariman Sabariman, Stefanus Eko Prasetyo
JTIM Jurnal Teknologi Informasi dan Multimedia (2025) Vol. 7, Iss. 1, pp. 133-148
Open Access
Generative Dynamic Graph Representation Learning for Conspiracy Spoofing Detection
Sheng Xiang, Yue-Ping Jiang, Y. Chen, et al.
(2025), pp. 5275-5284
Closed Access
Sheng Xiang, Yue-Ping Jiang, Y. Chen, et al.
(2025), pp. 5275-5284
Closed Access
A comparative study of shallow learning and deep transfer learning techniques for accurate fingerprints vitality detection
Donato Impedovo, Vincenzo Dentamaro, Giacomo Abbattista, et al.
Pattern Recognition Letters (2021) Vol. 151, pp. 11-18
Closed Access | Times Cited: 14
Donato Impedovo, Vincenzo Dentamaro, Giacomo Abbattista, et al.
Pattern Recognition Letters (2021) Vol. 151, pp. 11-18
Closed Access | Times Cited: 14
Deep Learning Algorithms based Fingerprint Authentication: Systematic Literature Review
Haruna Chiroma
Journal of Artificial Intelligence and Systems (2021) Vol. 3, Iss. 1, pp. 157-197
Open Access | Times Cited: 13
Haruna Chiroma
Journal of Artificial Intelligence and Systems (2021) Vol. 3, Iss. 1, pp. 157-197
Open Access | Times Cited: 13
VTAIM: Volatile Transaction Authentication Insurance Method for Cyber Security Risk Insurance of Banking Services
Osamah Almatari, Xiaomin Wang, Wenfang Zhang, et al.
Research Square (Research Square) (2023)
Closed Access | Times Cited: 4
Osamah Almatari, Xiaomin Wang, Wenfang Zhang, et al.
Research Square (Research Square) (2023)
Closed Access | Times Cited: 4
An open patch generator based fingerprint presentation attack detection using generative adversarial network
Anuj Rai, Ashutosh Anshul, Ashwini Jha, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 9, pp. 27723-27746
Closed Access | Times Cited: 4
Anuj Rai, Ashutosh Anshul, Ashwini Jha, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 9, pp. 27723-27746
Closed Access | Times Cited: 4
Bring Your Own Device (BYOD) Security Threats and Mitigation Mechanisms: Systematic Mapping
Christopher Ifeanyi Eke, Azah Norman Anir
(2021), pp. 1-10
Closed Access | Times Cited: 7
Christopher Ifeanyi Eke, Azah Norman Anir
(2021), pp. 1-10
Closed Access | Times Cited: 7
Machine Learning Approach for Detecting and Combating Bring Your Own Device (BYOD) Security Threats and Attacks: A systematic Mapping Review
Christopher Ifeanyi Eke, Azah Anir Norman, Mwenge Mulenga
Research Square (Research Square) (2022)
Open Access | Times Cited: 5
Christopher Ifeanyi Eke, Azah Anir Norman, Mwenge Mulenga
Research Square (Research Square) (2022)
Open Access | Times Cited: 5
Impact of Existing Deep CNN and Image Descriptors Empowered SVM Models on Fingerprint Presentation Attacks Detection
Jyotishna Baishya, Prasheel Kumar Tiwari, Anuj Rai, et al.
Lecture notes in networks and systems (2023), pp. 241-251
Closed Access | Times Cited: 2
Jyotishna Baishya, Prasheel Kumar Tiwari, Anuj Rai, et al.
Lecture notes in networks and systems (2023), pp. 241-251
Closed Access | Times Cited: 2
Conspiracy Spoofing Orders Detection with Transformer-Based Deep Graph Learning
Le Kang, Tai‐Jiang Mu, Xiaodong Ning
Lecture notes in computer science (2023), pp. 489-503
Closed Access | Times Cited: 2
Le Kang, Tai‐Jiang Mu, Xiaodong Ning
Lecture notes in computer science (2023), pp. 489-503
Closed Access | Times Cited: 2
An ensemble fraud detection approach for online loans based on application usage patterns
Meiling Xu, Yongqiang Fu, Boping Tian
Journal of Intelligent & Fuzzy Systems (2023) Vol. 44, Iss. 5, pp. 7181-7194
Closed Access | Times Cited: 1
Meiling Xu, Yongqiang Fu, Boping Tian
Journal of Intelligent & Fuzzy Systems (2023) Vol. 44, Iss. 5, pp. 7181-7194
Closed Access | Times Cited: 1
An Enhanced Generative Adversarial Network Model for Fingerprint Presentation Attack Detection
Ashutosh Anshul, Ashwini Jha, Prayag Jain, et al.
SN Computer Science (2023) Vol. 4, Iss. 5
Closed Access | Times Cited: 1
Ashutosh Anshul, Ashwini Jha, Prayag Jain, et al.
SN Computer Science (2023) Vol. 4, Iss. 5
Closed Access | Times Cited: 1
Enhancing Biometric Performance Through Mitigation of Sleep-Related Breaches
Urmila Pilania, Manoj Kumar, Sanjay Kumar Singh, et al.
Lecture notes in electrical engineering (2024), pp. 349-357
Closed Access
Urmila Pilania, Manoj Kumar, Sanjay Kumar Singh, et al.
Lecture notes in electrical engineering (2024), pp. 349-357
Closed Access
Deep insights on processing strata, features and detectors for fingerprint and iris liveness detection techniques
B. R. Rajakumar, S. Shanthi
Multimedia Tools and Applications (2024) Vol. 83, Iss. 23, pp. 63795-63846
Closed Access
B. R. Rajakumar, S. Shanthi
Multimedia Tools and Applications (2024) Vol. 83, Iss. 23, pp. 63795-63846
Closed Access
Effective Machine Learning Techniques and API Realizations for Visualizing Fraud Detection in Customer Transactions
Rina Ajay Yadav, Doina Logofatu, Sheikh Sharfuddin Mim, et al.
IFIP advances in information and communication technology (2024), pp. 301-315
Closed Access
Rina Ajay Yadav, Doina Logofatu, Sheikh Sharfuddin Mim, et al.
IFIP advances in information and communication technology (2024), pp. 301-315
Closed Access
An Explainable Deep Learning Model for Fingerprint Presentation Attack Detection
Anuj Rai, Somnath Dey
Communications in computer and information science (2024), pp. 309-321
Closed Access
Anuj Rai, Somnath Dey
Communications in computer and information science (2024), pp. 309-321
Closed Access
An Enhanced Generative Adversarial Network Model for Fingerprint Presentation Attack Detection
Ashutosh Anshul, Ashwini Jha, Prayag Jain, et al.
Lecture notes in computer science (2024), pp. 376-386
Closed Access
Ashutosh Anshul, Ashwini Jha, Prayag Jain, et al.
Lecture notes in computer science (2024), pp. 376-386
Closed Access
Deep Learning Models for Biometric Recognition based on Face, Finger vein, Fingerprint, and Iris: A Survey
Saif Mohanad Kadhim, Johnny Koh Siaw Paw, Chong Tak Yaw, et al.
Journal of Smart Internet of Things (2024) Vol. 2024, Iss. 1, pp. 117-157
Closed Access
Saif Mohanad Kadhim, Johnny Koh Siaw Paw, Chong Tak Yaw, et al.
Journal of Smart Internet of Things (2024) Vol. 2024, Iss. 1, pp. 117-157
Closed Access
IoT Droplocks: Wireless Fingerprint Theft Using Hacked Smart Locks
Steve Kerrison
2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics) (2022), pp. 107-112
Open Access | Times Cited: 2
Steve Kerrison
2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics) (2022), pp. 107-112
Open Access | Times Cited: 2