
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Unified unsupervised and semi-supervised domain adaptation network for cross-scenario face anti-spoofing
Yunpei Jia, Jie Zhang, Shiguang Shan, et al.
Pattern Recognition (2021) Vol. 115, pp. 107888-107888
Closed Access | Times Cited: 52
Yunpei Jia, Jie Zhang, Shiguang Shan, et al.
Pattern Recognition (2021) Vol. 115, pp. 107888-107888
Closed Access | Times Cited: 52
Showing 1-25 of 52 citing articles:
Deep Learning for Face Anti-Spoofing: A Survey
Zitong Yu, Yunxiao Qin, Xiaobai Li, et al.
IEEE Transactions on Pattern Analysis and Machine Intelligence (2022), pp. 1-22
Open Access | Times Cited: 123
Zitong Yu, Yunxiao Qin, Xiaobai Li, et al.
IEEE Transactions on Pattern Analysis and Machine Intelligence (2022), pp. 1-22
Open Access | Times Cited: 123
Generative Domain Adaptation for Face Anti-Spoofing
Qianyu Zhou, Ke-Yue Zhang, Taiping Yao, et al.
Lecture notes in computer science (2022), pp. 335-356
Closed Access | Times Cited: 44
Qianyu Zhou, Ke-Yue Zhang, Taiping Yao, et al.
Lecture notes in computer science (2022), pp. 335-356
Closed Access | Times Cited: 44
Source-Free Domain Adaptation With Domain Generalized Pretraining for Face Anti-Spoofing
Yuchen Liu, Y. R. Chen, Wenrui Dai, et al.
IEEE Transactions on Pattern Analysis and Machine Intelligence (2024) Vol. 46, Iss. 8, pp. 5430-5448
Closed Access | Times Cited: 9
Yuchen Liu, Y. R. Chen, Wenrui Dai, et al.
IEEE Transactions on Pattern Analysis and Machine Intelligence (2024) Vol. 46, Iss. 8, pp. 5430-5448
Closed Access | Times Cited: 9
Multi-Domain Incremental Learning for Face Presentation Attack Detection
Keyao Wang, Guosheng Zhang, Haixiao Yue, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2024) Vol. 38, Iss. 6, pp. 5499-5507
Open Access | Times Cited: 9
Keyao Wang, Guosheng Zhang, Haixiao Yue, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2024) Vol. 38, Iss. 6, pp. 5499-5507
Open Access | Times Cited: 9
Test-Time Domain Generalization for Face Anti-Spoofing
Qianyu Zhou, Ke-Yue Zhang, Taiping Yao, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2024) Vol. 30, pp. 175-187
Closed Access | Times Cited: 9
Qianyu Zhou, Ke-Yue Zhang, Taiping Yao, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2024) Vol. 30, pp. 175-187
Closed Access | Times Cited: 9
Real masks and spoof faces: On the masked face presentation attack detection
Meiling Fang, Naser Damer, Florian Kirchbuchner, et al.
Pattern Recognition (2021) Vol. 123, pp. 108398-108398
Open Access | Times Cited: 51
Meiling Fang, Naser Damer, Florian Kirchbuchner, et al.
Pattern Recognition (2021) Vol. 123, pp. 108398-108398
Open Access | Times Cited: 51
Adaptive Mixture of Experts Learning for Generalizable Face Anti-Spoofing
Qianyu Zhou, Ke-Yue Zhang, Taiping Yao, et al.
Proceedings of the 30th ACM International Conference on Multimedia (2022), pp. 6009-6018
Open Access | Times Cited: 36
Qianyu Zhou, Ke-Yue Zhang, Taiping Yao, et al.
Proceedings of the 30th ACM International Conference on Multimedia (2022), pp. 6009-6018
Open Access | Times Cited: 36
Consistency Regularization for Deep Face Anti-Spoofing
Zezheng Wang, Zitong Yu, Xun Wang, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 1127-1140
Open Access | Times Cited: 21
Zezheng Wang, Zitong Yu, Xun Wang, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 1127-1140
Open Access | Times Cited: 21
Unsupervised domain adaptation via progressive positioning of target-class prototypes
Yongjie Du, Ying Zhou, Yu Xie, et al.
Knowledge-Based Systems (2023) Vol. 273, pp. 110586-110586
Closed Access | Times Cited: 20
Yongjie Du, Ying Zhou, Yu Xie, et al.
Knowledge-Based Systems (2023) Vol. 273, pp. 110586-110586
Closed Access | Times Cited: 20
FLIP: Cross-domain Face Anti-spoofing with Language Guidance
Koushik Srivatsan, Muzammal Naseer, Karthik Nandakumar
2021 IEEE/CVF International Conference on Computer Vision (ICCV) (2023), pp. 19628-19639
Open Access | Times Cited: 18
Koushik Srivatsan, Muzammal Naseer, Karthik Nandakumar
2021 IEEE/CVF International Conference on Computer Vision (ICCV) (2023), pp. 19628-19639
Open Access | Times Cited: 18
Cyclically Disentangled Feature Translation for Face Anti-spoofing
Haixiao Yue, Keyao Wang, Guosheng Zhang, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2023) Vol. 37, Iss. 3, pp. 3358-3366
Open Access | Times Cited: 16
Haixiao Yue, Keyao Wang, Guosheng Zhang, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2023) Vol. 37, Iss. 3, pp. 3358-3366
Open Access | Times Cited: 16
Similar norm more transferable: Rethinking feature norms discrepancy in adversarial domain adaptation
Jun Dan, Mushui Liu, Chunfeng Xie, et al.
Knowledge-Based Systems (2024) Vol. 296, pp. 111908-111908
Closed Access | Times Cited: 6
Jun Dan, Mushui Liu, Chunfeng Xie, et al.
Knowledge-Based Systems (2024) Vol. 296, pp. 111908-111908
Closed Access | Times Cited: 6
One-Class Knowledge Distillation for Face Presentation Attack Detection
Zhi Li, Rizhao Cai, Haoliang Li, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 2137-2150
Open Access | Times Cited: 26
Zhi Li, Rizhao Cai, Haoliang Li, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 2137-2150
Open Access | Times Cited: 26
Source-Free Domain Adaptation with Contrastive Domain Alignment and Self-supervised Exploration for Face Anti-spoofing
Yuchen Liu, Yabo Chen, Wenrui Dai, et al.
Lecture notes in computer science (2022), pp. 511-528
Closed Access | Times Cited: 25
Yuchen Liu, Yabo Chen, Wenrui Dai, et al.
Lecture notes in computer science (2022), pp. 511-528
Closed Access | Times Cited: 25
Adversarial Learning Domain-Invariant Conditional Features for Robust Face Anti-spoofing
Fangling Jiang, Qi Li, Pengcheng Liu, et al.
International Journal of Computer Vision (2023) Vol. 131, Iss. 7, pp. 1680-1703
Closed Access | Times Cited: 15
Fangling Jiang, Qi Li, Pengcheng Liu, et al.
International Journal of Computer Vision (2023) Vol. 131, Iss. 7, pp. 1680-1703
Closed Access | Times Cited: 15
FASS: Face Anti-Spoofing System Using Image Quality Features and Deep Learning
Enoch Solomon, Krzysztof J. Cios
Electronics (2023) Vol. 12, Iss. 10, pp. 2199-2199
Open Access | Times Cited: 13
Enoch Solomon, Krzysztof J. Cios
Electronics (2023) Vol. 12, Iss. 10, pp. 2199-2199
Open Access | Times Cited: 13
Trust-aware conditional adversarial domain adaptation with feature norm alignment
Jun Dan, Tao Jin, Hao Chi, et al.
Neural Networks (2023) Vol. 168, pp. 518-530
Closed Access | Times Cited: 13
Jun Dan, Tao Jin, Hao Chi, et al.
Neural Networks (2023) Vol. 168, pp. 518-530
Closed Access | Times Cited: 13
Unknown-Aware Diverse Prompt Learning for Open-Set Single Domain Generalization-Based Face Anti-spoofing
Fangling Jiang, Qi Li, Weining Wang, et al.
Lecture notes in computer science (2025), pp. 275-285
Closed Access
Fangling Jiang, Qi Li, Weining Wang, et al.
Lecture notes in computer science (2025), pp. 275-285
Closed Access
Dual-Branch Meta-Learning Network With Distribution Alignment for Face Anti-Spoofing
Yunpei Jia, Jie Zhang, Shiguang Shan
IEEE Transactions on Information Forensics and Security (2021) Vol. 17, pp. 138-151
Closed Access | Times Cited: 28
Yunpei Jia, Jie Zhang, Shiguang Shan
IEEE Transactions on Information Forensics and Security (2021) Vol. 17, pp. 138-151
Closed Access | Times Cited: 28
Domain Adversarial Disentanglement Network With Cross-Domain Synthesis for Generalized Face Anti-Spoofing
Wenjun Yan, Ying Zeng, Haifeng Hu
IEEE Transactions on Circuits and Systems for Video Technology (2022) Vol. 32, Iss. 10, pp. 7033-7046
Closed Access | Times Cited: 20
Wenjun Yan, Ying Zeng, Haifeng Hu
IEEE Transactions on Circuits and Systems for Video Technology (2022) Vol. 32, Iss. 10, pp. 7033-7046
Closed Access | Times Cited: 20
A Learnable Gradient operator for face presentation attack detection
Caixun Wang, Bingyao Yu, Jie Zhou
Pattern Recognition (2022) Vol. 135, pp. 109146-109146
Closed Access | Times Cited: 19
Caixun Wang, Bingyao Yu, Jie Zhou
Pattern Recognition (2022) Vol. 135, pp. 109146-109146
Closed Access | Times Cited: 19
Face anti-spoofing using feature distilling and global attention learning
Rui Huang, Xin Wang
Pattern Recognition (2022) Vol. 135, pp. 109147-109147
Closed Access | Times Cited: 19
Rui Huang, Xin Wang
Pattern Recognition (2022) Vol. 135, pp. 109147-109147
Closed Access | Times Cited: 19
Domain Generalization for Face Anti-Spoofing via Negative Data Augmentation
Weihang Wang, Peilin Liu, Haoyuan Zheng, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 2333-2344
Closed Access | Times Cited: 11
Weihang Wang, Peilin Liu, Haoyuan Zheng, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 2333-2344
Closed Access | Times Cited: 11
Face Presentation Attack Detection Using Deep Background Subtraction
Azeddine Benlamoudi, Salah Eddine Bekhouche, Maarouf Korichi, et al.
Sensors (2022) Vol. 22, Iss. 10, pp. 3760-3760
Open Access | Times Cited: 16
Azeddine Benlamoudi, Salah Eddine Bekhouche, Maarouf Korichi, et al.
Sensors (2022) Vol. 22, Iss. 10, pp. 3760-3760
Open Access | Times Cited: 16
TF-FAS: Twofold-Element Fine-Grained Semantic Guidance for Generalizable Face Anti-spoofing
Xudong Wang, Ke-Yue Zhang, Taiping Yao, et al.
Lecture notes in computer science (2024), pp. 148-168
Closed Access | Times Cited: 3
Xudong Wang, Ke-Yue Zhang, Taiping Yao, et al.
Lecture notes in computer science (2024), pp. 148-168
Closed Access | Times Cited: 3