OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

MorGAN: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Generative Adversarial Network
Naser Damer, Alexandra Moseguí­ Saladié, Andreas Braun, et al.
(2018), pp. 1-10
Closed Access | Times Cited: 124

Showing 1-25 of 124 citing articles:

Generative Adversarial Networks
Zhipeng Cai, Zuobin Xiong, Honghui Xu, et al.
ACM Computing Surveys (2021) Vol. 54, Iss. 6, pp. 1-38
Closed Access | Times Cited: 269

Face Recognition Systems Under Morphing Attacks: A Survey
Ulrich Scherhag, Christian Rathgeb, Johannes Merkle, et al.
IEEE Access (2019) Vol. 7, pp. 23012-23026
Open Access | Times Cited: 221

Deep Face Representations for Differential Morphing Attack Detection
Ulrich Scherhag, Christian Rathgeb, Johannes Merkle, et al.
IEEE Transactions on Information Forensics and Security (2020) Vol. 15, pp. 3625-3639
Open Access | Times Cited: 107

Detection of Face Morphing Attacks Based on PRNU Analysis
Ulrich Scherhag, Luca Debiasi, Christian Rathgeb, et al.
IEEE Transactions on Biometrics Behavior and Identity Science (2019) Vol. 1, Iss. 4, pp. 302-317
Open Access | Times Cited: 106

Face Morphing Attack Generation and Detection: A Comprehensive Survey
Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, et al.
IEEE Transactions on Technology and Society (2021) Vol. 2, Iss. 3, pp. 128-145
Open Access | Times Cited: 97

Can GAN Generated Morphs Threaten Face Recognition Systems Equally as Landmark Based Morphs? - Vulnerability and Detection
Sushma Venkatesh, Haoyu Zhang, Raghavendra Ramachandra, et al.
(2020), pp. 1-6
Open Access | Times Cited: 89

MIPGAN—Generating Strong and High Quality Morphing Attacks Using Identity Prior Driven GAN
Haoyu Zhang, Sushma Venkatesh, Raghavendra Ramachandra, et al.
IEEE Transactions on Biometrics Behavior and Identity Science (2021) Vol. 3, Iss. 3, pp. 365-383
Open Access | Times Cited: 89

Morphing Attack Detection-Database, Evaluation Platform, and Benchmarking
Kiran Raja, Matteo Ferrara, Annalisa Franco, et al.
IEEE Transactions on Information Forensics and Security (2020) Vol. 16, pp. 4336-4351
Open Access | Times Cited: 73

Privacy-friendly Synthetic Data for the Development of Face Morphing Attack Detectors
Naser Damer, Cesar Augusto Fontanillo Lopez, Meiling Fang, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2022), pp. 1605-1616
Open Access | Times Cited: 39

Warning: Humans cannot reliably detect speech deepfakes
T. Kimberly, Sergi D. Bray, T. Davies, et al.
PLoS ONE (2023) Vol. 18, Iss. 8, pp. e0285333-e0285333
Open Access | Times Cited: 25

Leveraging Diffusion for Strong and High Quality Face Morphing Attacks
Zander Blasingame, Chen Liu
IEEE Transactions on Biometrics Behavior and Identity Science (2024) Vol. 6, Iss. 1, pp. 118-131
Closed Access | Times Cited: 8

Detecting Face Morphing Attacks by Analyzing the Directed Distances of Facial Landmarks Shifts
Naser Damer, Viola Boller, Yaza Wainakh, et al.
Lecture notes in computer science (2019), pp. 518-534
Closed Access | Times Cited: 58

Iris and periocular biometrics for head mounted displays: Segmentation, recognition, and synthetic data generation
Fadi Boutros, Naser Damer, Kiran Raja, et al.
Image and Vision Computing (2020) Vol. 104, pp. 104007-104007
Closed Access | Times Cited: 44

Detecting Morphed Face Attacks Using Residual Noise from Deep Multi-scale Context Aggregation Network
Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, et al.
(2020), pp. 269-278
Open Access | Times Cited: 42

Mutual Information Maximization on Disentangled Representations for Differential Morph Detection
Sobhan Soleymani, Ali Dabouei, Fariborz Taherkhani, et al.
(2021), pp. 1730-1740
Open Access | Times Cited: 33

PW-MAD: Pixel-Wise Supervision for Generalized Face Morphing Attack Detection
Naser Damer, Noémie Spiller, Meiling Fang, et al.
Lecture notes in computer science (2021), pp. 291-304
Closed Access | Times Cited: 33

Face de‐morphing based on identity feature transfer
Le‐Bing Zhang, Song Chen, Min Long, et al.
IET Image Processing (2025) Vol. 19, Iss. 1
Open Access

A geometry-aware generative model for face morphing attacks
Zongyong Deng, Qijun Zhao, Libin Ye, et al.
Knowledge-Based Systems (2025) Vol. 314, pp. 113231-113231
Closed Access

To Detect or not to Detect: The Right Faces to Morph
Naser Damer, Alexandra Moseguí­ Saladié, Steffen Zienert, et al.
(2019), pp. 1-8
Closed Access | Times Cited: 41

Border Control Morphing Attack Detection with a Convolutional Neural Network De-morphing Approach
David Ortega-delCampo, Cristina Conde, Daniel Palacios‐Alonso, et al.
IEEE Access (2020), pp. 1-1
Open Access | Times Cited: 37

A Multi-detector Solution Towards an Accurate and Generalized Detection of Face Morphing Attacks
Naser Damer, Steffen Zienert, Yaza Wainakh, et al.
2022 25th International Conference on Information Fusion (FUSION) (2019), pp. 1-8
Closed Access | Times Cited: 36

PE-MIU: A Training-Free Privacy-Enhancing Face Recognition Approach Based on Minimum Information Units
Philipp Terhörst, Kevin Riehl, Naser Damer, et al.
IEEE Access (2020) Vol. 8, pp. 93635-93647
Open Access | Times Cited: 35

Detection of Morphed Face Images Using Discriminative Wavelet Sub-bands
Poorya Aghdaie, Baaria Chaudhary, Sobhan Soleymani, et al.
(2021)
Open Access | Times Cited: 32

Page 1 - Next Page

Scroll to top