
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Survey on the Detection and Impacts of Deepfakes in Visual, Audio, and Textual Formats
Rami Mubarak, Tariq Alsboui, Omar Alshaikh, et al.
IEEE Access (2023) Vol. 11, pp. 144497-144529
Open Access | Times Cited: 22
Rami Mubarak, Tariq Alsboui, Omar Alshaikh, et al.
IEEE Access (2023) Vol. 11, pp. 144497-144529
Open Access | Times Cited: 22
Showing 22 citing articles:
Deepfake video detection: challenges and opportunities
Achhardeep Kaur, Azadeh Noori Hoshyar, Vidya Saikrishna, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 6
Closed Access | Times Cited: 14
Achhardeep Kaur, Azadeh Noori Hoshyar, Vidya Saikrishna, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 6
Closed Access | Times Cited: 14
GPT-Neo-CRV: Elevating Information Accuracy in GPT-Neo with Cross-Referential Validation
Xingyu Xiong, Mingliang Zheng
(2024)
Open Access | Times Cited: 10
Xingyu Xiong, Mingliang Zheng
(2024)
Open Access | Times Cited: 10
Advanced Deep Fake Detection: Leveraging Xgboost and SVM with Multi Modal Features
K Suriyaprakash, Shyam Sundar S, G. D. Vignesh
SSRN Electronic Journal (2025)
Closed Access
K Suriyaprakash, Shyam Sundar S, G. D. Vignesh
SSRN Electronic Journal (2025)
Closed Access
أثر برامج التربية الإعلامية الرقمية في تعزيز وعي المراهقين بالتزييف المرئي العميق
محمود عبدالحليم
Al-Maǧallah Al-Miṣriyyaẗ Li-Buḥūṯ Al-Rāʼī Al-ʿām (2025) Vol. 24, Iss. 1, pp. 151-184
Closed Access
محمود عبدالحليم
Al-Maǧallah Al-Miṣriyyaẗ Li-Buḥūṯ Al-Rāʼī Al-ʿām (2025) Vol. 24, Iss. 1, pp. 151-184
Closed Access
Lotus: Creating Short Videos From Long Videos With Abstractive and Extractive Summarization
Aadit Barua, Karim Benharrak, Meng Chen, et al.
(2025), pp. 967-981
Open Access
Aadit Barua, Karim Benharrak, Meng Chen, et al.
(2025), pp. 967-981
Open Access
The New Paradigm of Deepfake Detection at the Text Level
Cosmina Mihaela Rosca, Adrian Stancu, Emilian Marian Iovanovici
Applied Sciences (2025) Vol. 15, Iss. 5, pp. 2560-2560
Open Access
Cosmina Mihaela Rosca, Adrian Stancu, Emilian Marian Iovanovici
Applied Sciences (2025) Vol. 15, Iss. 5, pp. 2560-2560
Open Access
Novel transfer learning based acoustic feature engineering for scene fake audio detection
Ahmad Sami Al-Shamayleh, Hafsa Riasat, Ala Saleh Alluhaidan, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Ahmad Sami Al-Shamayleh, Hafsa Riasat, Ala Saleh Alluhaidan, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Explore the World of Audio Deepfakes: A Guide to Detection Techniques for Non-Experts
Karla Schäfer, Jeongeun Choi, Sascha Zmudzinski
(2024), pp. 13-22
Closed Access | Times Cited: 3
Karla Schäfer, Jeongeun Choi, Sascha Zmudzinski
(2024), pp. 13-22
Closed Access | Times Cited: 3
Regulating Generative AI: Ethical Considerations and Explainability Benchmarks
C.K. Luk, Hoi-Lam Chung, Wai-Kuen Yim, et al.
(2024)
Open Access | Times Cited: 2
C.K. Luk, Hoi-Lam Chung, Wai-Kuen Yim, et al.
(2024)
Open Access | Times Cited: 2
Efficient Deepfake Audio Detection Using Spectro-Temporal Analysis and Deep Learning
A. Srinagesh
Deleted Journal (2024) Vol. 20, Iss. 5s, pp. 10-18
Open Access | Times Cited: 1
A. Srinagesh
Deleted Journal (2024) Vol. 20, Iss. 5s, pp. 10-18
Open Access | Times Cited: 1
Cybersecurity Education and Awareness Among Parents and Teachers: A Survey of Bahrain
Mohamed Ayyash, Tariq Alsboui, Omar Alshaikh, et al.
IEEE Access (2024) Vol. 12, pp. 86596-86617
Open Access | Times Cited: 1
Mohamed Ayyash, Tariq Alsboui, Omar Alshaikh, et al.
IEEE Access (2024) Vol. 12, pp. 86596-86617
Open Access | Times Cited: 1
Guardian AI: Synthetic Media Forensics through Multimodal Fusion and Advanced Machine Learning
K Karthikeyan, R Swetha, S Deepanraj, et al.
(2024), pp. 226-232
Closed Access | Times Cited: 1
K Karthikeyan, R Swetha, S Deepanraj, et al.
(2024), pp. 226-232
Closed Access | Times Cited: 1
Role of human physiology and facial biomechanics towards building robust deepfake detectors: A comprehensive survey and analysis
R. Chakraborty, Ruchira Naskar
Computer Science Review (2024) Vol. 54, pp. 100677-100677
Closed Access | Times Cited: 1
R. Chakraborty, Ruchira Naskar
Computer Science Review (2024) Vol. 54, pp. 100677-100677
Closed Access | Times Cited: 1
A survey on deep learning based reenactment methods for deepfake applications
Ramamurthy Dhanyalakshmi, Claudiu Pop̂ırlan, D. Jude Hemanth
IET Image Processing (2024) Vol. 18, Iss. 14, pp. 4433-4460
Open Access
Ramamurthy Dhanyalakshmi, Claudiu Pop̂ırlan, D. Jude Hemanth
IET Image Processing (2024) Vol. 18, Iss. 14, pp. 4433-4460
Open Access
Pp-Dfd: A Privacy-Preserving Deepfake Detection
Riyanka Jena, Maniklal Das, Priyanka Singh
(2024)
Closed Access
Riyanka Jena, Maniklal Das, Priyanka Singh
(2024)
Closed Access
Understanding Seniors’ Strategies for Identifying Deepfakes
Zhong Tang, Dion Hoe‐Lian Goh, Chei Sian Lee, et al.
Communications in computer and information science (2024), pp. 236-244
Closed Access
Zhong Tang, Dion Hoe‐Lian Goh, Chei Sian Lee, et al.
Communications in computer and information science (2024), pp. 236-244
Closed Access
Detecting Manipulated Audio Using Adaboost Machine Learning Algorithm
B Vinay Kumar, Yalanati Ayyappa, P. Jeevan Sai, et al.
(2024), pp. 252-257
Closed Access
B Vinay Kumar, Yalanati Ayyappa, P. Jeevan Sai, et al.
(2024), pp. 252-257
Closed Access
Deepfake Face Extraction and Detection Using MTCNN-Vision Transformers
Richa Singh, K. Ashwini, BShanmuga Priya, et al.
(2024), pp. 01-08
Closed Access
Richa Singh, K. Ashwini, BShanmuga Priya, et al.
(2024), pp. 01-08
Closed Access
The Emerging Challenges of Wearable Biometric Cryptosystems
Khalid Al Ajlan, Tariq Alsboui, Omar Alshaikh, et al.
Cryptography (2024) Vol. 8, Iss. 3, pp. 27-27
Open Access
Khalid Al Ajlan, Tariq Alsboui, Omar Alshaikh, et al.
Cryptography (2024) Vol. 8, Iss. 3, pp. 27-27
Open Access
Security Considerations in Generative AI for Web Applications
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 281-332
Closed Access
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 281-332
Closed Access
Leveraging Artificial Intelligence (AI) by a Strategic Defense against Deepfakes and Digital Misinformation
Chris Gilbert, Mercy Abiola Gilbert
International Journal of Scientific Research and Modern Technology. (2024) Vol. 3, Iss. 11, pp. 62-78
Open Access
Chris Gilbert, Mercy Abiola Gilbert
International Journal of Scientific Research and Modern Technology. (2024) Vol. 3, Iss. 11, pp. 62-78
Open Access
Predictive Techniques for Identifying and Classifying Real and Ai-Generated Voices
Manali Shukla, Anjali Saraswat, Shrabani Mallick, et al.
(2024)
Closed Access
Manali Shukla, Anjali Saraswat, Shrabani Mallick, et al.
(2024)
Closed Access
Ethical framework for AI education based on large language models
Yuyang Yan, Hui Liu
Education and Information Technologies (2024)
Open Access
Yuyang Yan, Hui Liu
Education and Information Technologies (2024)
Open Access