OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Disguise detection and face recognition in visible and thermal spectrums
Tejas I. Dhamecha, Aastha Nigam, Richa Singh, et al.
(2013), pp. 1-8
Closed Access | Times Cited: 102

Showing 1-25 of 102 citing articles:

Person Recognition System Based on a Combination of Body Images from Visible Light and Thermal Cameras
Dat Nguyen, Hyung Hong, Ki Hyun Kim, et al.
Sensors (2017) Vol. 17, Iss. 3, pp. 605-605
Open Access | Times Cited: 555

Biometric Antispoofing Methods: A Survey in Face Recognition
Javier Galbally, Sébastien Marcel, Julián Fiérrez
IEEE Access (2014) Vol. 2, pp. 1530-1552
Open Access | Times Cited: 395

Privacy–Enhancing Face Biometrics: A Comprehensive Survey
Blaz̆ Meden, Peter Rot, Philipp Terhörst, et al.
IEEE Transactions on Information Forensics and Security (2021) Vol. 16, pp. 4147-4183
Open Access | Times Cited: 130

A Comprehensive Database for Benchmarking Imaging Systems
Karen Panetta, Qianwen Wan, Sos С. Agaian, et al.
IEEE Transactions on Pattern Analysis and Machine Intelligence (2018) Vol. 42, Iss. 3, pp. 509-520
Closed Access | Times Cited: 148

Recognizing Disguised Faces: Human and Machine Evaluation
Tejas I. Dhamecha, Richa Singh, Mayank Vatsa, et al.
PLoS ONE (2014) Vol. 9, Iss. 7, pp. e99212-e99212
Open Access | Times Cited: 124

MorGAN: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Generative Adversarial Network
Naser Damer, Alexandra Moseguí­ Saladié, Andreas Braun, et al.
(2018), pp. 1-10
Closed Access | Times Cited: 124

Face anti-spoofing using Haralick features
Akshay Agarwal, Richa Singh, Mayank Vatsa
(2016), pp. 1-6
Closed Access | Times Cited: 122

Face Presentation Attack with Latex Masks in Multispectral Videos
Akshay Agarwal, Daksha Yadav, Naman Kohli, et al.
(2017), pp. 275-283
Closed Access | Times Cited: 109

Learning One Class Representations for Face Presentation Attack Detection Using Multi-Channel Convolutional Neural Networks
Anjith George, Sébastien Marcel
IEEE Transactions on Information Forensics and Security (2020) Vol. 16, pp. 361-375
Open Access | Times Cited: 103

Reliable face anti-spoofing using multispectral SWIR imaging
H. Steiner, Andreas Kolb, Norbert Jung
(2016), pp. 1-8
Closed Access | Times Cited: 89

Learning Structure and Strength of CNN Filters for Small Sample Size Training
Rohit Keshari, Mayank Vatsa, Richa Singh, et al.
(2018)
Open Access | Times Cited: 87

Biometric Face Presentation Attack Detection With Multi-Channel Convolutional Neural Network
Anjith George, Zohreh Mostaani, David Geissenbuhler, et al.
IEEE Transactions on Information Forensics and Security (2019) Vol. 15, pp. 42-55
Open Access | Times Cited: 85

Disguised Faces in the Wild
Vineet Kushwaha, Maneet Singh, Richa Singh, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2018)
Closed Access | Times Cited: 83

Cross Modal Focal Loss for RGBD Face Anti-Spoofing
Anjith George, Sébastien Marcel
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2021), pp. 7878-7887
Open Access | Times Cited: 83

Attacks and defenses in user authentication systems: A survey
Xuerui Wang, Zheng Yan, Rui Zhang, et al.
Journal of Network and Computer Applications (2021) Vol. 188, pp. 103080-103080
Closed Access | Times Cited: 62

Face Liveness Detection Using a Flash Against 2D Spoofing Attack
Patrick P. K. Chan, Weiwen Liu, Danni Chen, et al.
IEEE Transactions on Information Forensics and Security (2017) Vol. 13, Iss. 2, pp. 521-534
Closed Access | Times Cited: 72

On the Robustness of Face Recognition Algorithms Against Attacks and Bias
Richa Singh, Akshay Agarwal, Maneet Singh, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2020) Vol. 34, Iss. 09, pp. 13583-13589
Open Access | Times Cited: 67

Face recognition under spoofing attacks: countermeasures and research directions
Lei Li, Paulo Lobato Correia, Abdenour Hadid
IET Biometrics (2017) Vol. 7, Iss. 1, pp. 3-14
Closed Access | Times Cited: 66

Recognizing Disguised Faces in the Wild
Maneet Singh, Richa Singh, Mayank Vatsa, et al.
IEEE Transactions on Biometrics Behavior and Identity Science (2019) Vol. 1, Iss. 2, pp. 97-108
Open Access | Times Cited: 59

Detecting Face Morphing Attacks by Analyzing the Directed Distances of Facial Landmarks Shifts
Naser Damer, Viola Boller, Yaza Wainakh, et al.
Lecture notes in computer science (2019), pp. 518-534
Closed Access | Times Cited: 58

Finger Vein Presentation Attack Detection Using Total Variation Decomposition
Xinwei Qiu, Wenxiong Kang, Senping Tian, et al.
IEEE Transactions on Information Forensics and Security (2017) Vol. 13, Iss. 2, pp. 465-477
Closed Access | Times Cited: 60

Recognizing human faces under disguise and makeup
Tsung Ying Wang, Ajay Kumar
(2016), pp. 1-7
Closed Access | Times Cited: 47

An automated and efficient convolutional architecture for disguise-invariant face recognition using noise-based data augmentation and deep transfer learning
Muhammad Junaid Khan, Muhammad Jaleed Khan, Adil Masood Siddiqui, et al.
The Visual Computer (2021) Vol. 38, Iss. 2, pp. 509-523
Closed Access | Times Cited: 39

A review of state-of-the-art in Face Presentation Attack Detection: From early development to advanced deep learning and multi-modal fusion methods
Faseela Abdullakutty, Eyad Elyan, Pamela Johnston
Information Fusion (2021) Vol. 75, pp. 55-69
Open Access | Times Cited: 36

Deep Spiking Neural Network for Video-Based Disguise Face Recognition Based on Dynamic Facial Movements
Daqi Liu, Nicola Bellotto, Shigang Yue
IEEE Transactions on Neural Networks and Learning Systems (2019) Vol. 31, Iss. 6, pp. 1843-1855
Closed Access | Times Cited: 36

Page 1 - Next Page

Scroll to top