
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
The Threat of Deep Fake Technology to Trusted Identity Management
Atif Ali, Yasir Khan Jadoon, Zulqarnain Farid, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-5
Closed Access | Times Cited: 10
Atif Ali, Yasir Khan Jadoon, Zulqarnain Farid, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-5
Closed Access | Times Cited: 10
Showing 10 citing articles:
A Review of Deep Learning-based Approaches for Deepfake Content Detection
Leandro A. Passos, Danilo Jodas, Kelton Augusto Pontara da Costa, et al.
Authorea (Authorea) (2023)
Open Access | Times Cited: 24
Leandro A. Passos, Danilo Jodas, Kelton Augusto Pontara da Costa, et al.
Authorea (Authorea) (2023)
Open Access | Times Cited: 24
Development and use of Artificial Intelligence in the Defense Sector
Atif Ali, Zulqarnain Farid, Amer Hani Al-Kassem, et al.
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2023), pp. 1-10
Closed Access | Times Cited: 19
Atif Ali, Zulqarnain Farid, Amer Hani Al-Kassem, et al.
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2023), pp. 1-10
Closed Access | Times Cited: 19
Emotional Reactions To AI-Generated Images: A Pilot Study Using Neurophysiological Measures
Marco Bilucaglia, Chiara Casiraghi, Alessandro Bruno, et al.
Lecture notes in computer science (2025), pp. 147-161
Closed Access
Marco Bilucaglia, Chiara Casiraghi, Alessandro Bruno, et al.
Lecture notes in computer science (2025), pp. 147-161
Closed Access
DeepFake on Face and Expression Swap: A Review
Saima Waseem, S. A. R. Abu–Bakar, Bilal Ashfaq Ahmed, et al.
IEEE Access (2023) Vol. 11, pp. 117865-117906
Open Access | Times Cited: 11
Saima Waseem, S. A. R. Abu–Bakar, Bilal Ashfaq Ahmed, et al.
IEEE Access (2023) Vol. 11, pp. 117865-117906
Open Access | Times Cited: 11
An Automated Platform for Gathering and Managing Open-Source Cyber Threat Intelligence
Nidal A. Al-Dmour, Mohammad Kamrul Hasan, Masood Ajmal, et al.
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2023), pp. 1-7
Closed Access | Times Cited: 7
Nidal A. Al-Dmour, Mohammad Kamrul Hasan, Masood Ajmal, et al.
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2023), pp. 1-7
Closed Access | Times Cited: 7
The Synergy of Artificial Intelligence and Cybersecurity
Atif Ali, Shahzad Ahmed, Muhammad Hussain, et al.
(2024), pp. 1-5
Closed Access | Times Cited: 1
Atif Ali, Shahzad Ahmed, Muhammad Hussain, et al.
(2024), pp. 1-5
Closed Access | Times Cited: 1
Deepfake Technology and Its Implications for Influencer Marketing
Muskan Arora, Kaushal Kishore Mishra, Mandeep Singh, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 66-90
Closed Access | Times Cited: 1
Muskan Arora, Kaushal Kishore Mishra, Mandeep Singh, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 66-90
Closed Access | Times Cited: 1
A Review of Deep Learning-based Approaches for Deepfake Content Detection
Leandro A. Passos, Danilo Jodas, Kelton Augusto Pontara da Costa, et al.
arXiv (Cornell University) (2022)
Open Access | Times Cited: 6
Leandro A. Passos, Danilo Jodas, Kelton Augusto Pontara da Costa, et al.
arXiv (Cornell University) (2022)
Open Access | Times Cited: 6
Balancing the Risks and Rewards of Deepfake and Synthetic Media Technology: A Regulatory Framework for Emerging Economies
Mohammad Hassan Shakil, Fisseha Mekuria
(2024), pp. 114-119
Closed Access
Mohammad Hassan Shakil, Fisseha Mekuria
(2024), pp. 114-119
Closed Access
An Analysis of Browser and Machine Fingerprinting Techniques
Muhammad Mudassar, Muhammad Shaiq Ali, Atif Ali, et al.
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2023), pp. 1-8
Closed Access | Times Cited: 1
Muhammad Mudassar, Muhammad Shaiq Ali, Atif Ali, et al.
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2023), pp. 1-8
Closed Access | Times Cited: 1