
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Makeup Presentation Attacks: Review and Detection Performance Benchmark
Christian Rathgeb, Pawel Drozdowski, Christoph Busch
IEEE Access (2020) Vol. 8, pp. 224958-224973
Open Access | Times Cited: 23
Christian Rathgeb, Pawel Drozdowski, Christoph Busch
IEEE Access (2020) Vol. 8, pp. 224958-224973
Open Access | Times Cited: 23
Showing 23 citing articles:
Adversarial Attacks Against Face Recognition: A Comprehensive Study
Fatemeh Vakhshiteh, Ahmad Nickabadi, Raghavendra Ramachandra
IEEE Access (2021) Vol. 9, pp. 92735-92756
Open Access | Times Cited: 41
Fatemeh Vakhshiteh, Ahmad Nickabadi, Raghavendra Ramachandra
IEEE Access (2021) Vol. 9, pp. 92735-92756
Open Access | Times Cited: 41
DeepFakes Detection Based on Heart Rate Estimation: Single- and Multi-frame
Javier Hernandez‐Ortega, Rubén Tolosana, Julián Fiérrez, et al.
Advances in computer vision and pattern recognition (2022), pp. 255-273
Open Access | Times Cited: 25
Javier Hernandez‐Ortega, Rubén Tolosana, Julián Fiérrez, et al.
Advances in computer vision and pattern recognition (2022), pp. 255-273
Open Access | Times Cited: 25
FASS: Face Anti-Spoofing System Using Image Quality Features and Deep Learning
Enoch Solomon, Krzysztof J. Cios
Electronics (2023) Vol. 12, Iss. 10, pp. 2199-2199
Open Access | Times Cited: 13
Enoch Solomon, Krzysztof J. Cios
Electronics (2023) Vol. 12, Iss. 10, pp. 2199-2199
Open Access | Times Cited: 13
Computer Vision and Deep Learning-Based Model for Detecting Spoofed Faces in Images
Gayathri P Salian, M. Koteswara Rao, M. Rashmi
Lecture notes in networks and systems (2025), pp. 15-26
Closed Access
Gayathri P Salian, M. Koteswara Rao, M. Rashmi
Lecture notes in networks and systems (2025), pp. 15-26
Closed Access
Standards for Biometric Presentation Attack Detection
Christoph Busch
Advances in computer vision and pattern recognition (2023), pp. 571-583
Closed Access | Times Cited: 4
Christoph Busch
Advances in computer vision and pattern recognition (2023), pp. 571-583
Closed Access | Times Cited: 4
Detection of Adversarial Facial Accessory Presentation Attacks Using Local Face Differential
Fei Peng, Le Qin, Min Long, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2024) Vol. 20, Iss. 7, pp. 1-28
Closed Access | Times Cited: 1
Fei Peng, Le Qin, Min Long, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2024) Vol. 20, Iss. 7, pp. 1-28
Closed Access | Times Cited: 1
Presentation Attack Detection: A Systematic Literature Review
Matineh Pooshideh, Amin Beheshti, Yuankai Qi, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 1, pp. 1-32
Open Access | Times Cited: 1
Matineh Pooshideh, Amin Beheshti, Yuankai Qi, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 1, pp. 1-32
Open Access | Times Cited: 1
Deep Learning Models for Automatic Makeup Detection
Theiab Alzahrani, Baidaa Al‐Bander, Waleed Al‐Nuaimy
AI (2021) Vol. 2, Iss. 4, pp. 497-511
Open Access | Times Cited: 9
Theiab Alzahrani, Baidaa Al‐Bander, Waleed Al‐Nuaimy
AI (2021) Vol. 2, Iss. 4, pp. 497-511
Open Access | Times Cited: 9
Makeup Presentation Attack Potential Revisited: Skills Pay the Bills
Pawel Drozdowski, S. Grobarek, J. Schurse, et al.
(2021) Vol. 2013, pp. 1-6
Closed Access | Times Cited: 8
Pawel Drozdowski, S. Grobarek, J. Schurse, et al.
(2021) Vol. 2013, pp. 1-6
Closed Access | Times Cited: 8
Impact of facial tattoos and paintings on face recognition systems
Mathias Ibsen, Christian Rathgeb, Thomas Fink, et al.
IET Biometrics (2021) Vol. 10, Iss. 6, pp. 706-719
Open Access | Times Cited: 7
Mathias Ibsen, Christian Rathgeb, Thomas Fink, et al.
IET Biometrics (2021) Vol. 10, Iss. 6, pp. 706-719
Open Access | Times Cited: 7
Differential Anomaly Detection for Facial Images
Mathias Ibsen, Lázaro J. González‐Soler, Christian Rathgeb, et al.
(2021), pp. 1-6
Open Access | Times Cited: 6
Mathias Ibsen, Lázaro J. González‐Soler, Christian Rathgeb, et al.
(2021), pp. 1-6
Open Access | Times Cited: 6
Reliable detection of doppelgängers based on deep face representations
Christian Rathgeb, Daniel Fischer, Pawel Drozdowski, et al.
IET Biometrics (2022) Vol. 11, Iss. 3, pp. 215-224
Open Access | Times Cited: 4
Christian Rathgeb, Daniel Fischer, Pawel Drozdowski, et al.
IET Biometrics (2022) Vol. 11, Iss. 3, pp. 215-224
Open Access | Times Cited: 4
Challenges for automated face recognition systems
Christoph Busch
Nature Reviews Electrical Engineering (2024)
Closed Access
Christoph Busch
Nature Reviews Electrical Engineering (2024)
Closed Access
Evaluating and Enhancing Face Anti-Spoofing Algorithms for Light Makeup: A General Detection Approach
Zhimao Lai, Yang Guo, Yongjian Hu, et al.
Sensors (2024) Vol. 24, Iss. 24, pp. 8075-8075
Open Access
Zhimao Lai, Yang Guo, Yongjian Hu, et al.
Sensors (2024) Vol. 24, Iss. 24, pp. 8075-8075
Open Access
A Novel Deep Learning-Based Method for Real-Time Face Spoof Detection
Muhammad Amir Malik, Tehseen Mazhar, Dr Inayatul Haq, et al.
(2023)
Open Access | Times Cited: 1
Muhammad Amir Malik, Tehseen Mazhar, Dr Inayatul Haq, et al.
(2023)
Open Access | Times Cited: 1
Impact of Doppelgängers on Face Recognition: Database and Evaluation
Christian Rathgeb, Pawel Drozdowski, M. Obel, et al.
(2021), pp. 1-4
Closed Access | Times Cited: 2
Christian Rathgeb, Pawel Drozdowski, M. Obel, et al.
(2021), pp. 1-4
Closed Access | Times Cited: 2
Disentanglement of Deep Features for Adversarial Face Detection
Bo Yan, Quanwei Wu, Yi Wang
Lecture notes in computer science (2022), pp. 149-157
Closed Access | Times Cited: 1
Bo Yan, Quanwei Wu, Yi Wang
Lecture notes in computer science (2022), pp. 149-157
Closed Access | Times Cited: 1
Keystroke Presentation Attack: Generative Adversarial Networks for replacing user behaviour
Idoia Eizagirre, Lander Segurola-Gil, Francesco Zola, et al.
(2022), pp. 119-126
Closed Access | Times Cited: 1
Idoia Eizagirre, Lander Segurola-Gil, Francesco Zola, et al.
(2022), pp. 119-126
Closed Access | Times Cited: 1
Differential Anomaly Detection for Facial Images
Mathias Ibsen, Lázaro J. González‐Soler, Christian Rathgeb, et al.
arXiv (Cornell University) (2021)
Open Access | Times Cited: 1
Mathias Ibsen, Lázaro J. González‐Soler, Christian Rathgeb, et al.
arXiv (Cornell University) (2021)
Open Access | Times Cited: 1
A Novel Deep Learning-Based Method for Real-Time Face Spoof Detection
Muhammad Amir Malik, Tehseen Mazhar, Inayatul Haq, et al.
Research Square (Research Square) (2023)
Open Access
Muhammad Amir Malik, Tehseen Mazhar, Inayatul Haq, et al.
Research Square (Research Square) (2023)
Open Access
Recent Advancement in 3D Biometrics using Monocular Camera
Aritra Mukherjee, Abhijit Das
(2023), pp. 1-14
Open Access
Aritra Mukherjee, Abhijit Das
(2023), pp. 1-14
Open Access
Differential Anomaly Detection for Facial Images.
Mathias Ibsen, Lázaro J. González‐Soler, Christian Rathgeb, et al.
arXiv (Cornell University) (2021)
Closed Access
Mathias Ibsen, Lázaro J. González‐Soler, Christian Rathgeb, et al.
arXiv (Cornell University) (2021)
Closed Access