
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Face anti-spoofing using Haralick features
Akshay Agarwal, Richa Singh, Mayank Vatsa
(2016), pp. 1-6
Closed Access | Times Cited: 122
Akshay Agarwal, Richa Singh, Mayank Vatsa
(2016), pp. 1-6
Closed Access | Times Cited: 122
Showing 1-25 of 122 citing articles:
Learning Deep Models for Face Anti-Spoofing: Binary or Auxiliary Supervision
Yaojie Liu, Amin Jourabloo, Xiaoming Liu
(2018), pp. 389-398
Open Access | Times Cited: 623
Yaojie Liu, Amin Jourabloo, Xiaoming Liu
(2018), pp. 389-398
Open Access | Times Cited: 623
Face anti-spoofing using patch and depth-based CNNs
Yousef Atoum, Yaojie Liu, Amin Jourabloo, et al.
(2017)
Closed Access | Times Cited: 393
Yousef Atoum, Yaojie Liu, Amin Jourabloo, et al.
(2017)
Closed Access | Times Cited: 393
Deep Tree Learning for Zero-Shot Face Anti-Spoofing
Yaojie Liu, Joel Stehouwer, Amin Jourabloo, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2019), pp. 4675-4684
Open Access | Times Cited: 240
Yaojie Liu, Joel Stehouwer, Amin Jourabloo, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2019), pp. 4675-4684
Open Access | Times Cited: 240
Face Anti-Spoofing: Model Matters, so Does Data
Xiao Yang, Wenhan Luo, Linchao Bao, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2019), pp. 3502-3511
Closed Access | Times Cited: 220
Xiao Yang, Wenhan Luo, Linchao Bao, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2019), pp. 3502-3511
Closed Access | Times Cited: 220
Deep Spatial Gradient and Temporal Depth Learning for Face Anti-Spoofing
Zezheng Wang, Zitong Yu, Chenxu Zhao, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2020), pp. 5041-5050
Open Access | Times Cited: 199
Zezheng Wang, Zitong Yu, Chenxu Zhao, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2020), pp. 5041-5050
Open Access | Times Cited: 199
A comprehensive overview of biometric fusion
Maneet Singh, Richa Singh, Arun Ross
Information Fusion (2019) Vol. 52, pp. 187-205
Open Access | Times Cited: 189
Maneet Singh, Richa Singh, Arun Ross
Information Fusion (2019) Vol. 52, pp. 187-205
Open Access | Times Cited: 189
Remote Photoplethysmography Correspondence Feature for 3D Mask Face Presentation Attack Detection
Si-Qi Liu, Xiangyuan Lan, Pong C. Yuen
Lecture notes in computer science (2018), pp. 577-594
Closed Access | Times Cited: 126
Si-Qi Liu, Xiangyuan Lan, Pong C. Yuen
Lecture notes in computer science (2018), pp. 577-594
Closed Access | Times Cited: 126
Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition
Gaurav Goswami, Akshay Agarwal, Nalini Ratha, et al.
International Journal of Computer Vision (2019) Vol. 127, Iss. 6-7, pp. 719-742
Closed Access | Times Cited: 110
Gaurav Goswami, Akshay Agarwal, Nalini Ratha, et al.
International Journal of Computer Vision (2019) Vol. 127, Iss. 6-7, pp. 719-742
Closed Access | Times Cited: 110
Face Presentation Attack with Latex Masks in Multispectral Videos
Akshay Agarwal, Daksha Yadav, Naman Kohli, et al.
(2017), pp. 275-283
Closed Access | Times Cited: 109
Akshay Agarwal, Daksha Yadav, Naman Kohli, et al.
(2017), pp. 275-283
Closed Access | Times Cited: 109
Spoofing Deep Face Recognition with Custom Silicone Masks
Sushil Bhattacharjee, Amir H. Mohammadi, Sébastien Marcel
(2018), pp. 1-7
Open Access | Times Cited: 101
Sushil Bhattacharjee, Amir H. Mohammadi, Sébastien Marcel
(2018), pp. 1-7
Open Access | Times Cited: 101
A survey on 3D mask presentation attack detection and countermeasures
Shan Jia, Guodong Guo, Zhengquan Xu
Pattern Recognition (2019) Vol. 98, pp. 107032-107032
Closed Access | Times Cited: 87
Shan Jia, Guodong Guo, Zhengquan Xu
Pattern Recognition (2019) Vol. 98, pp. 107032-107032
Closed Access | Times Cited: 87
Face Liveness Detection by rPPG Features and Contextual Patch-Based CNN
Bofan Lin, Xiaobai Li, Zitong Yu, et al.
(2019), pp. 61-68
Open Access | Times Cited: 81
Bofan Lin, Xiaobai Li, Zitong Yu, et al.
(2019), pp. 61-68
Open Access | Times Cited: 81
Adaptive Transformers for Robust Few-shot Cross-domain Face Anti-spoofing
Hsin–Ping Huang, Deqing Sun, Yaojie Liu, et al.
Lecture notes in computer science (2022), pp. 37-54
Closed Access | Times Cited: 49
Hsin–Ping Huang, Deqing Sun, Yaojie Liu, et al.
Lecture notes in computer science (2022), pp. 37-54
Closed Access | Times Cited: 49
Learning Multi-Granularity Temporal Characteristics for Face Anti-Spoofing
Zhuo Wang, Qiangchang Wang, Weihong Deng, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 1254-1269
Closed Access | Times Cited: 42
Zhuo Wang, Qiangchang Wang, Weihong Deng, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 1254-1269
Closed Access | Times Cited: 42
Face spoofing detection with local binary pattern network
Lei Li, Xiaoyi Feng, Zhaoqiang Xia, et al.
Journal of Visual Communication and Image Representation (2018) Vol. 54, pp. 182-192
Closed Access | Times Cited: 77
Lei Li, Xiaoyi Feng, Zhaoqiang Xia, et al.
Journal of Visual Communication and Image Representation (2018) Vol. 54, pp. 182-192
Closed Access | Times Cited: 77
SWAPPED! Digital face presentation attack detection via weighted local magnitude pattern
Akshay Agarwal, Richa Singh, Mayank Vatsa, et al.
(2017), pp. 659-665
Closed Access | Times Cited: 74
Akshay Agarwal, Richa Singh, Mayank Vatsa, et al.
(2017), pp. 659-665
Closed Access | Times Cited: 74
On the Robustness of Face Recognition Algorithms Against Attacks and Bias
Richa Singh, Akshay Agarwal, Maneet Singh, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2020) Vol. 34, Iss. 09, pp. 13583-13589
Open Access | Times Cited: 67
Richa Singh, Akshay Agarwal, Maneet Singh, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2020) Vol. 34, Iss. 09, pp. 13583-13589
Open Access | Times Cited: 67
Time Analysis of Pulse-Based Face Anti-Spoofing in Visible and NIR
Javier Hernandez‐Ortega, Julián Fiérrez, Aythami Morales, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2018), pp. 657-6578
Closed Access | Times Cited: 65
Javier Hernandez‐Ortega, Julián Fiérrez, Aythami Morales, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2018), pp. 657-6578
Closed Access | Times Cited: 65
A comparative study on face spoofing attacks
Sandeep Kumar, Sukhwinder Singh, Jagdish Kumar
(2017)
Closed Access | Times Cited: 64
Sandeep Kumar, Sukhwinder Singh, Jagdish Kumar
(2017)
Closed Access | Times Cited: 64
Fusion of Handcrafted and Deep Learning Features for Large-Scale Multiple Iris Presentation Attack Detection
Daksha Yadav, Naman Kohli, Akshay Agarwal, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2018)
Closed Access | Times Cited: 62
Daksha Yadav, Naman Kohli, Akshay Agarwal, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2018)
Closed Access | Times Cited: 62
3D Face Anti-Spoofing With Factorized Bilinear Coding
Shan Jia, Xin Li, Chuanbo Hu, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2020) Vol. 31, Iss. 10, pp. 4031-4045
Open Access | Times Cited: 58
Shan Jia, Xin Li, Chuanbo Hu, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2020) Vol. 31, Iss. 10, pp. 4031-4045
Open Access | Times Cited: 58
Face Liveness Detection Using Artificial Intelligence Techniques: A Systematic Literature Review and Future Directions
Smita Khairnar, Shilpa Gite, Ketan Kotecha, et al.
Big Data and Cognitive Computing (2023) Vol. 7, Iss. 1, pp. 37-37
Open Access | Times Cited: 17
Smita Khairnar, Shilpa Gite, Ketan Kotecha, et al.
Big Data and Cognitive Computing (2023) Vol. 7, Iss. 1, pp. 37-37
Open Access | Times Cited: 17
A survey on face presentation attack detection mechanisms: hitherto and future perspectives
Deepika Sharma, Arvind Selwal
Multimedia Systems (2023) Vol. 29, Iss. 3, pp. 1527-1577
Open Access | Times Cited: 16
Deepika Sharma, Arvind Selwal
Multimedia Systems (2023) Vol. 29, Iss. 3, pp. 1527-1577
Open Access | Times Cited: 16
Replayed Video Attack Detection Based on Motion Blur Analysis
Lei Li, Zhaoqiang Xia, Abdenour Hadid, et al.
IEEE Transactions on Information Forensics and Security (2019) Vol. 14, Iss. 9, pp. 2246-2261
Open Access | Times Cited: 51
Lei Li, Zhaoqiang Xia, Abdenour Hadid, et al.
IEEE Transactions on Information Forensics and Security (2019) Vol. 14, Iss. 9, pp. 2246-2261
Open Access | Times Cited: 51
Light Field-Based Face Presentation Attack Detection: Reviewing, Benchmarking and One Step Further
Alireza Sepas‐Moghaddam, Fernando Pereira, Paulo Lobato Correia
IEEE Transactions on Information Forensics and Security (2018) Vol. 13, Iss. 7, pp. 1696-1709
Closed Access | Times Cited: 47
Alireza Sepas‐Moghaddam, Fernando Pereira, Paulo Lobato Correia
IEEE Transactions on Information Forensics and Security (2018) Vol. 13, Iss. 7, pp. 1696-1709
Closed Access | Times Cited: 47