
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Facial makeup detection technique based on texture and shape analysis
Neslihan Köse, Ludovic Apvrille, Jean‐Luc Dugelay
(2015), pp. 1-7
Closed Access | Times Cited: 39
Neslihan Köse, Ludovic Apvrille, Jean‐Luc Dugelay
(2015), pp. 1-7
Closed Access | Times Cited: 39
Showing 1-25 of 39 citing articles:
Deepfakes and beyond: A Survey of face manipulation and fake detection
Rubén Tolosana, Rubén Vera-Rodríguez, Julián Fiérrez, et al.
Information Fusion (2020) Vol. 64, pp. 131-148
Open Access | Times Cited: 741
Rubén Tolosana, Rubén Vera-Rodríguez, Julián Fiérrez, et al.
Information Fusion (2020) Vol. 64, pp. 131-148
Open Access | Times Cited: 741
Detecting Facial Retouching Using Supervised Deep Learning
Aparna Bharati, Richa Singh, Mayank Vatsa, et al.
IEEE Transactions on Information Forensics and Security (2016) Vol. 11, Iss. 9, pp. 1903-1913
Closed Access | Times Cited: 130
Aparna Bharati, Richa Singh, Mayank Vatsa, et al.
IEEE Transactions on Information Forensics and Security (2016) Vol. 11, Iss. 9, pp. 1903-1913
Closed Access | Times Cited: 130
Impact and Detection of Facial Beautification in Face Recognition: An Overview
Christian Rathgeb, Antitza Dantcheva, Christoph Busch
IEEE Access (2019) Vol. 7, pp. 152667-152678
Open Access | Times Cited: 70
Christian Rathgeb, Antitza Dantcheva, Christoph Busch
IEEE Access (2019) Vol. 7, pp. 152667-152678
Open Access | Times Cited: 70
Spoofing faces using makeup: An investigative study
Cunjian Chen, Antitza Dantcheva, Thomas Swearingen, et al.
(2017), pp. 1-8
Open Access | Times Cited: 68
Cunjian Chen, Antitza Dantcheva, Thomas Swearingen, et al.
(2017), pp. 1-8
Open Access | Times Cited: 68
An automated and efficient convolutional architecture for disguise-invariant face recognition using noise-based data augmentation and deep transfer learning
Muhammad Junaid Khan, Muhammad Jaleed Khan, Adil Masood Siddiqui, et al.
The Visual Computer (2021) Vol. 38, Iss. 2, pp. 509-523
Closed Access | Times Cited: 39
Muhammad Junaid Khan, Muhammad Jaleed Khan, Adil Masood Siddiqui, et al.
The Visual Computer (2021) Vol. 38, Iss. 2, pp. 509-523
Closed Access | Times Cited: 39
Hybrid algorithms for brain tumor segmentation, classification and feature extraction
Hassan Habib, Rashid Amin, Bilal Ahmed, et al.
Journal of Ambient Intelligence and Humanized Computing (2021) Vol. 13, Iss. 5, pp. 2763-2784
Closed Access | Times Cited: 38
Hassan Habib, Rashid Amin, Bilal Ahmed, et al.
Journal of Ambient Intelligence and Humanized Computing (2021) Vol. 13, Iss. 5, pp. 2763-2784
Closed Access | Times Cited: 38
On Detecting GANs and Retouching based Synthetic Alterations
Anubhav Jain, Richa Singh, Mayank Vatsa
(2018), pp. 1-7
Open Access | Times Cited: 40
Anubhav Jain, Richa Singh, Mayank Vatsa
(2018), pp. 1-7
Open Access | Times Cited: 40
Recent Advances in Face Presentation Attack Detection
Sushil Bhattacharjee, Amir H. Mohammadi, André Anjos, et al.
Advances in computer vision and pattern recognition (2019), pp. 207-228
Closed Access | Times Cited: 37
Sushil Bhattacharjee, Amir H. Mohammadi, André Anjos, et al.
Advances in computer vision and pattern recognition (2019), pp. 207-228
Closed Access | Times Cited: 37
DeepFakes and Beyond: A Survey of Face Manipulation and Fake Detection
Rubén Tolosana, Rubén Vera-Rodríguez, Julián Fiérrez, et al.
arXiv (Cornell University) (2020)
Closed Access | Times Cited: 35
Rubén Tolosana, Rubén Vera-Rodríguez, Julián Fiérrez, et al.
arXiv (Cornell University) (2020)
Closed Access | Times Cited: 35
Demography-based facial retouching detection using subclass supervised sparse autoencoder
Aparna Bharati, Mayank Vatsa, Richa Singh, et al.
(2017), pp. 474-482
Open Access | Times Cited: 30
Aparna Bharati, Mayank Vatsa, Richa Singh, et al.
(2017), pp. 474-482
Open Access | Times Cited: 30
Detection of Age-Induced Makeup Attacks on Face Recognition Systems Using Multi-Layer Deep Features
Ketan Kotwal, Zohreh Mostaani, Sébastien Marcel
IEEE Transactions on Biometrics Behavior and Identity Science (2019) Vol. 2, Iss. 1, pp. 15-25
Open Access | Times Cited: 29
Ketan Kotwal, Zohreh Mostaani, Sébastien Marcel
IEEE Transactions on Biometrics Behavior and Identity Science (2019) Vol. 2, Iss. 1, pp. 15-25
Open Access | Times Cited: 29
Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns
Esteban Alejandro Armas Vega, Ana Lucila Sandoval Orozco, Luis Javier García Villalba, et al.
Sensors (2018) Vol. 18, Iss. 10, pp. 3372-3372
Open Access | Times Cited: 24
Esteban Alejandro Armas Vega, Ana Lucila Sandoval Orozco, Luis Javier García Villalba, et al.
Sensors (2018) Vol. 18, Iss. 10, pp. 3372-3372
Open Access | Times Cited: 24
Makeup Presentation Attacks: Review and Detection Performance Benchmark
Christian Rathgeb, Pawel Drozdowski, Christoph Busch
IEEE Access (2020) Vol. 8, pp. 224958-224973
Open Access | Times Cited: 23
Christian Rathgeb, Pawel Drozdowski, Christoph Busch
IEEE Access (2020) Vol. 8, pp. 224958-224973
Open Access | Times Cited: 23
Detection of Makeup Presentation Attacks based on Deep Face Representations
Christian Rathgeb, Pawel Drozdowski, Christoph Busch
2022 26th International Conference on Pattern Recognition (ICPR) (2021)
Open Access | Times Cited: 19
Christian Rathgeb, Pawel Drozdowski, Christoph Busch
2022 26th International Conference on Pattern Recognition (ICPR) (2021)
Open Access | Times Cited: 19
Identifying Unknown Android Malware with Feature Extractions and Classification Techniques
Ludovic Apvrille, Axelle Apvrille
2015 IEEE Trustcom/BigDataSE/ISPA (2015), pp. 182-189
Closed Access | Times Cited: 18
Ludovic Apvrille, Axelle Apvrille
2015 IEEE Trustcom/BigDataSE/ISPA (2015), pp. 182-189
Closed Access | Times Cited: 18
Parameter agnostic stacked wavelet transformer for detecting singularities
Akshay Agarwal, Mayank Vatsa, Richa Singh, et al.
Information Fusion (2023) Vol. 95, pp. 415-425
Closed Access | Times Cited: 5
Akshay Agarwal, Mayank Vatsa, Richa Singh, et al.
Information Fusion (2023) Vol. 95, pp. 415-425
Closed Access | Times Cited: 5
Cosmetic Detection Framework for Face and Iris Biometrics
Omid Sharifi, Maryam Eskandarı
Symmetry (2018) Vol. 10, Iss. 4, pp. 122-122
Open Access | Times Cited: 15
Omid Sharifi, Maryam Eskandarı
Symmetry (2018) Vol. 10, Iss. 4, pp. 122-122
Open Access | Times Cited: 15
Identifying Unknown Android Malware with Feature Extractions and Classification Techniques
Ludovic Apvrille, Axelle Apvrille
Trust, Security And Privacy In Computing And Communications (2015), pp. 182-189
Closed Access | Times Cited: 14
Ludovic Apvrille, Axelle Apvrille
Trust, Security And Privacy In Computing And Communications (2015), pp. 182-189
Closed Access | Times Cited: 14
Vulnerability Assessment and Detection of Makeup Presentation Attacks
Christian Rathgeb, Pawel Drozdowski, Daniel Fischer, et al.
(2020), pp. 1-6
Closed Access | Times Cited: 11
Christian Rathgeb, Pawel Drozdowski, Daniel Fischer, et al.
(2020), pp. 1-6
Closed Access | Times Cited: 11
SherlockDroid: a research assistant to spot unknown malware in Android marketplaces
Axelle Apvrille, Ludovic Apvrille
Journal of Computer Virology and Hacking Techniques (2015) Vol. 11, Iss. 4, pp. 235-245
Closed Access | Times Cited: 9
Axelle Apvrille, Ludovic Apvrille
Journal of Computer Virology and Hacking Techniques (2015) Vol. 11, Iss. 4, pp. 235-245
Closed Access | Times Cited: 9
Perceptual Quality Assessment of Retouched Face Images
Guanghui Yue, Honglv Wu, Qiuping Jiang, et al.
IEEE Transactions on Multimedia (2023) Vol. 26, pp. 5741-5752
Closed Access | Times Cited: 3
Guanghui Yue, Honglv Wu, Qiuping Jiang, et al.
IEEE Transactions on Multimedia (2023) Vol. 26, pp. 5741-5752
Closed Access | Times Cited: 3
Facial Retouching and Alteration Detection
Puspita Majumdar, Akshay Agarwal, Mayank Vatsa, et al.
Advances in computer vision and pattern recognition (2022), pp. 367-387
Open Access | Times Cited: 5
Puspita Majumdar, Akshay Agarwal, Mayank Vatsa, et al.
Advances in computer vision and pattern recognition (2022), pp. 367-387
Open Access | Times Cited: 5
Integrating facial makeup detection into multimodal biometric user verification system
Ekberjan Derman, Chiara Galdi, Jean‐Luc Dugelay
(2017) Vol. 5, pp. 1-6
Closed Access | Times Cited: 5
Ekberjan Derman, Chiara Galdi, Jean‐Luc Dugelay
(2017) Vol. 5, pp. 1-6
Closed Access | Times Cited: 5
Bio-Inspired Presentation Attack Detection for Face Biometrics
Aristeidis Tsitiridis, Cristina Conde, Beatriz Gomez Ayllon, et al.
Frontiers in Computational Neuroscience (2019) Vol. 13
Open Access | Times Cited: 5
Aristeidis Tsitiridis, Cristina Conde, Beatriz Gomez Ayllon, et al.
Frontiers in Computational Neuroscience (2019) Vol. 13
Open Access | Times Cited: 5
On Detecting GANs and Retouching based Synthetic Alterations.
Anubhav Jain, Richa Singh, Mayank Vatsa
arXiv (Cornell University) (2019)
Closed Access | Times Cited: 5
Anubhav Jain, Richa Singh, Mayank Vatsa
arXiv (Cornell University) (2019)
Closed Access | Times Cited: 5