OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A critical literature survey and prospects on tampering and anomaly detection in image data
Kelton Augusto Pontara da Costa, João Paulo Papa, Leandro A. Passos, et al.
Applied Soft Computing (2020) Vol. 97, pp. 106727-106727
Closed Access | Times Cited: 27

Showing 1-25 of 27 citing articles:

Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews
Fran Casino, Thomas K. Dasaklis, Γεώργιος Σπαθούλας, et al.
IEEE Access (2022) Vol. 10, pp. 25464-25493
Open Access | Times Cited: 84

Artificial Intelligence for Trusted Autonomous Satellite Operations
Kathiravan Thangavel, Roberto Sabatini, Alessandro Gardi, et al.
Progress in Aerospace Sciences (2023) Vol. 144, pp. 100960-100960
Open Access | Times Cited: 24

Anomaly diagnosis of connected autonomous vehicles: A survey
Yukun Fang, Haigen Min, Xia Wu, et al.
Information Fusion (2024) Vol. 105, pp. 102223-102223
Closed Access | Times Cited: 10

Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives
Deepak Adhikari, Wei Jiang, Jinyu Zhan, et al.
Computer Science Review (2024) Vol. 54, pp. 100665-100665
Closed Access | Times Cited: 6

Interpretable deep learning architecture for gastrointestinal disease detection: A Tri-stage approach with PCA and XAI
Md. Faysal Ahamed, Fariya Bintay Shafi, Md. Nahiduzzaman, et al.
Computers in Biology and Medicine (2024) Vol. 185, pp. 109503-109503
Closed Access | Times Cited: 5

Image forgery detection: comprehensive review of digital forensics approaches
Satyendra Singh, Rajesh Kumar
Journal of Computational Social Science (2024) Vol. 7, Iss. 1, pp. 877-915
Closed Access | Times Cited: 4

Robust and secured watermarking using Ja-Fi optimization for digital image transmission in social media
K. Jyothsna Devi, Priyanka Singh, Hiren Kumar Thakkar, et al.
Applied Soft Computing (2022) Vol. 131, pp. 109781-109781
Closed Access | Times Cited: 20

Real-time deep learning method for automated detection and localization of structural defects in manufactured products
Danilo Avola, Marco Cascio, Luigi Cinque, et al.
Computers & Industrial Engineering (2022) Vol. 172, pp. 108512-108512
Closed Access | Times Cited: 19

Automatic anomaly detection from X-ray images based on autoencoders
Alice Presenti, Z. Liang, Luis F. Alves Pereira, et al.
Nondestructive Testing And Evaluation (2022) Vol. 37, Iss. 5, pp. 552-565
Open Access | Times Cited: 17

Dictionary learning with cone atoms and application to anomaly detection
Andra Bălțoiu, Denis C. Ilie-Ablachim, Bogdan Dumitrescu
Signal Processing (2024) Vol. 219, pp. 109398-109398
Closed Access | Times Cited: 3

A Comprehensive Survey on Methods for Image Integrity
Paola Capasso, Giuseppe Cattaneo, Maria De Marsico
ACM Transactions on Multimedia Computing Communications and Applications (2023) Vol. 20, Iss. 11, pp. 1-34
Open Access | Times Cited: 8

PrivacyProber: Assessment and Detection of Soft–Biometric Privacy–Enhancing Techniques
Peter Rot, Klemen Grm, Peter Peer, et al.
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 21, Iss. 4, pp. 2869-2887
Open Access | Times Cited: 7

Canonical cortical graph neural networks and its application for speech enhancement in audio-visual hearing aids
Leandro A. Passos, João Paulo Papa, Amir Hussain, et al.
Neurocomputing (2022) Vol. 527, pp. 196-203
Open Access | Times Cited: 11

Pixel tampering detection in encrypted surveillance videos on resource-constrained devices
Ifeoluwapo Aribilola, Brian Lee, Mamoona Naveed Asghar
Internet of Things (2024) Vol. 25, pp. 101058-101058
Open Access | Times Cited: 1

A Novel Image Splicing Detection Algorithm Based on Generalized and Traditional Benford’s Law
Arman Parnak, Yasser Baleghi, Javad Kazemitabar
International Journal of Engineering (2022) Vol. 35, Iss. 04, pp. 626-634
Open Access | Times Cited: 6

A Comprehensive Review on Computer Vision and Fuzzy Logic in Forensic Science Application
Prarthi Thakkar, Darshil Patel, Isha Hirpara, et al.
Annals of Data Science (2022) Vol. 10, Iss. 3, pp. 761-785
Closed Access | Times Cited: 6

A neighborhood weighted-based method for the detection of outliers
Zhongyang Xiong, Hua Long, Yufang Zhang, et al.
Applied Intelligence (2022) Vol. 53, Iss. 9, pp. 9897-9915
Closed Access | Times Cited: 6

Adaptive clustering-based approach for forgery detection in images containing similar appearing but authentic objects
Anuja Dixit, Soumen Bag
Applied Soft Computing (2021) Vol. 113, pp. 107893-107893
Closed Access | Times Cited: 6

Enhancing Video Anomaly Detection with Improved UNET and Cascade Sliding Window Technique
Sreedevi R Krishnan, P. Amudha
Informatics and Automation (2024) Vol. 23, Iss. 6, pp. 1899-1930
Open Access

Detecting atherosclerotic plaque calcifications of the carotid artery through optimum-path forest
Danilo Samuel Jodas, Mateus Roder, Rafael G. Pires, et al.
Elsevier eBooks (2022), pp. 137-154
Closed Access | Times Cited: 2

Embedded Hash Codes for Image Similarity Detection and Tamper Proofing
Sajid Nazir, Mohammad Kaleem
(2022), pp. 1-5
Open Access | Times Cited: 2

A cross-domain qualitative meta-analysis of digital forensics: Research trends, challenges, and emerging topics.
Fran Casino, Thomas K. Dasaklis, Γεώργιος Σπαθούλας, et al.
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 2

Detecting Soft-Biometric Privacy Enhancement
Peter Rot, Peter Peer, Vitomir Štruc
Advances in computer vision and pattern recognition (2022), pp. 391-411
Open Access | Times Cited: 1

Editorial: Applying Machine Learning for Combating Fake News and Internet/Media Content Manipulation
Michał Choraś, Konstantinos Demestichas, Álvaro Herrero, et al.
Applied Soft Computing (2021) Vol. 110, pp. 107779-107779
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top