OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Face Spoofing Detection Method Based on Domain Adaptation and Lossless Size Adaptation
Wenyun Sun, Yu Song, Haitao Zhao, et al.
IEEE Access (2020) Vol. 8, pp. 66553-66563
Open Access | Times Cited: 39

Showing 1-25 of 39 citing articles:

Face Spoofing, Age, Gender and Facial Expression Recognition Using Advance Neural Network Architecture-Based Biometric System
Sandeep Kumar, Shilpa Rani, Arpit Jain, et al.
Sensors (2022) Vol. 22, Iss. 14, pp. 5160-5160
Open Access | Times Cited: 87

Revisiting Pixel-Wise Supervision for Face Anti-Spoofing
Zitong Yu, Xiaobai Li, Jingang Shi, et al.
IEEE Transactions on Biometrics Behavior and Identity Science (2021) Vol. 3, Iss. 3, pp. 285-295
Open Access | Times Cited: 97

Face Liveness Detection Using Artificial Intelligence Techniques: A Systematic Literature Review and Future Directions
Smita Khairnar, Shilpa Gite, Ketan Kotecha, et al.
Big Data and Cognitive Computing (2023) Vol. 7, Iss. 1, pp. 37-37
Open Access | Times Cited: 17

A survey on face presentation attack detection mechanisms: hitherto and future perspectives
Deepika Sharma, Arvind Selwal
Multimedia Systems (2023) Vol. 29, Iss. 3, pp. 1527-1577
Open Access | Times Cited: 16

Look Locally Infer Globally: A Generalizable Face Anti-Spoofing Approach
Debayan Deb, Anil K. Jain
IEEE Transactions on Information Forensics and Security (2020) Vol. 16, pp. 1143-1157
Open Access | Times Cited: 47

LBP and CNN feature fusion for face anti-spoofing
Ravi Pratap Singh, Ratnakar Dash, Ramesh Kumar Mohapatra
Pattern Analysis and Applications (2023) Vol. 26, Iss. 2, pp. 773-782
Closed Access | Times Cited: 13

Face Spoof Detection: The Preprocessing Paradigm
Ravi Pratap Singh, Ratnakar Dash, Ramesh Kumar Mohapatra
Communications in computer and information science (2025), pp. 15-26
Closed Access

Face spoofing detection based on multi-scale color inversion dual-stream convolutional neural network
Xin Shu, Xiaojie Li, Xin Zuo, et al.
Expert Systems with Applications (2023) Vol. 224, pp. 119988-119988
Closed Access | Times Cited: 11

A robust framework for spoofing detection in faces using deep learning
Shefali Arora, M. P. S. Bhatia, Vipul Mittal
The Visual Computer (2021) Vol. 38, Iss. 7, pp. 2461-2472
Closed Access | Times Cited: 26

Presentation Attack Detection: A Systematic Literature Review
Matineh Pooshideh, Amin Beheshti, Yuankai Qi, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 1, pp. 1-32
Open Access | Times Cited: 1

Audiovisual emotion recognition based on bi-layer LSTM and multi-head attention mechanism on RAVDESS dataset
Zeyu Jin, Wenjiao Zai
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access | Times Cited: 1

One-Class Learning Method Based on Live Correlation Loss for Face Anti-Spoofing
Seokjae Lim, Yongjae Gwak, Wonjun Kim, et al.
IEEE Access (2020) Vol. 8, pp. 201635-201648
Open Access | Times Cited: 10

Deep Learning for Face Anti-Spoofing: A Survey
Zitong Yu, Yunxiao Qin, Xiaobai Li, et al.
arXiv (Cornell University) (2021)
Open Access | Times Cited: 9

Efficient Face Spoofing Detection With Flash
Akinori F. Ebihara, K. Sakurai, Hitoshi Imaoka
IEEE Transactions on Biometrics Behavior and Identity Science (2021) Vol. 3, Iss. 4, pp. 535-549
Open Access | Times Cited: 9

On Analysis of Face Liveness Detection Mechanisms via Deep Learning Models
Syed Zoofa Rufai, Arvind Selwal, Deepika Sharma
2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) (2022), pp. 59-64
Closed Access | Times Cited: 4

Boosting Face Presentation Attack Detection in Multi-Spectral Videos Through Score Fusion of Wavelet Partition Images
Akshay Agarwal, Richa Singh, Mayank Vatsa, et al.
Frontiers in Big Data (2022) Vol. 5
Open Access | Times Cited: 3

Stegano-Morphing: Concealing Attacks on Face Identification Algorithms
Luis Carabe, Eduardo CermeƱo
IEEE Access (2021) Vol. 9, pp. 100851-100867
Open Access | Times Cited: 4

Implementation of Face Feature Algorithms for Authentication of a Person (IFFAP)
A C Ramachandra, B Monisha, Poorvika Muralapur, et al.
(2024), pp. 1-8
Closed Access

A Novel Face Liveness Detection System for the Identification of Real and Fake Images Using Deep Learning Model
Masooda, G. Suchetha, C. Harinakshi
Lecture notes in electrical engineering (2024), pp. 379-389
Closed Access

Unveiling Spoofing Attempts: A DCGAN-based Approach to Enhance Face Spoof Detection in Biometric Authentication
Vuda Sreenivasa Rao, Shirisha Kasireddy, Annapurna Mishra, et al.
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 4
Open Access

Evaluation of Deep Learning Methods and Face Detection Framework with Convolutional Neural Network
Gowri Vidhya N, Vijay Jeyakumar, Arul Selvi R
2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS) (2023), pp. 1-6
Closed Access | Times Cited: 1

Malpractice Detection in Online Proctoring using Deep Learning
Immadi Dhatri Raga Priya, Ponnaluri Sree Ramya, Mulugu Veera Vamshi, et al.
(2023), pp. 575-583
Closed Access | Times Cited: 1

An Improved Face Liveness Detection Algorithm Based on Deep Convolution Neural Network
Yan Zhou, Wei Xie, Jinhu Wei
(2021), pp. 1839-1844
Closed Access | Times Cited: 3

Look Locally Infer Globally: A Generalizable Face Anti-Spoofing Approach
Debayan Deb, Anil K. Jain
arXiv (Cornell University) (2020)
Closed Access | Times Cited: 1

Segmentation Method for Face Modelling in Thermal Images
Albar Albar, Hendrick Hendrick, Rahmad Hidayat
Knowledge Engineering and Data Science (2020) Vol. 3, Iss. 2, pp. 99-99
Open Access | Times Cited: 1

Page 1 - Next Page

Scroll to top