
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
SYN-MAD 2022: Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data
Marco Huber, Fadi Boutros, Anh Thi Luu, et al.
(2022), pp. 1-10
Open Access | Times Cited: 25
Marco Huber, Fadi Boutros, Anh Thi Luu, et al.
(2022), pp. 1-10
Open Access | Times Cited: 25
Showing 25 citing articles:
Synthetic ID Card Image Generation for Improving Presentation Attack Detection
Daniel P. Benalcazar, Juan Tapia, Sebastian Gonzalez, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 1814-1824
Open Access | Times Cited: 24
Daniel P. Benalcazar, Juan Tapia, Sebastian Gonzalez, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 1814-1824
Open Access | Times Cited: 24
MorDIFF: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Diffusion Autoencoders
Naser Damer, Meiling Fang, Patrick Siebke, et al.
(2023), pp. 1-6
Open Access | Times Cited: 21
Naser Damer, Meiling Fang, Patrick Siebke, et al.
(2023), pp. 1-6
Open Access | Times Cited: 21
Deepfakes as a threat to a speaker and facial recognition: An overview of tools and attack vectors
Anton Firc, Kamil Malinka, Petr Hanáček
Heliyon (2023) Vol. 9, Iss. 4, pp. e15090-e15090
Open Access | Times Cited: 18
Anton Firc, Kamil Malinka, Petr Hanáček
Heliyon (2023) Vol. 9, Iss. 4, pp. e15090-e15090
Open Access | Times Cited: 18
SynthASpoof: Developing Face Presentation Attack Detection Based on Privacy-friendly Synthetic Data
Meiling Fang, Marco Huber, Naser Damer
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2023), pp. 1061-1070
Open Access | Times Cited: 16
Meiling Fang, Marco Huber, Naser Damer
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2023), pp. 1061-1070
Open Access | Times Cited: 16
Face de‐morphing based on identity feature transfer
Le‐Bing Zhang, Song Chen, Min Long, et al.
IET Image Processing (2025) Vol. 19, Iss. 1
Open Access
Le‐Bing Zhang, Song Chen, Min Long, et al.
IET Image Processing (2025) Vol. 19, Iss. 1
Open Access
Single-morphing attack detection using few-shot learning and triplet-loss
Juan Tapia, Daniel Schulz, Christoph Busch
Neurocomputing (2025), pp. 130033-130033
Closed Access
Juan Tapia, Daniel Schulz, Christoph Busch
Neurocomputing (2025), pp. 130033-130033
Closed Access
Identity-driven Three-Player Generative Adversarial Network for Synthetic-based Face Recognition
Jan Niklas Kolf, Tim Rieber, Jurek Elliesen, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2023), pp. 806-816
Open Access | Times Cited: 10
Jan Niklas Kolf, Tim Rieber, Jurek Elliesen, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2023), pp. 806-816
Open Access | Times Cited: 10
Fast-DiM: Towards Fast Diffusion Morphs
Zander Blasingame, Chen Liu
IEEE Security & Privacy (2024) Vol. 22, Iss. 4, pp. 103-114
Closed Access | Times Cited: 2
Zander Blasingame, Chen Liu
IEEE Security & Privacy (2024) Vol. 22, Iss. 4, pp. 103-114
Closed Access | Times Cited: 2
Face Morphing Attack Detection with Denoising Diffusion Probabilistic Models
Marija Ivanovska, Vitomir Štruc
(2023), pp. 1-6
Open Access | Times Cited: 6
Marija Ivanovska, Vitomir Štruc
(2023), pp. 1-6
Open Access | Times Cited: 6
Trans-FD: Transformer-Based Representation Interaction for Face De-Morphing
Min Long, Qiangqiang Duan, Le‐Bing Zhang, et al.
IEEE Transactions on Biometrics Behavior and Identity Science (2024) Vol. 6, Iss. 3, pp. 385-397
Closed Access | Times Cited: 1
Min Long, Qiangqiang Duan, Le‐Bing Zhang, et al.
IEEE Transactions on Biometrics Behavior and Identity Science (2024) Vol. 6, Iss. 3, pp. 385-397
Closed Access | Times Cited: 1
Greedy-DiM: Greedy Algorithms for Unreasonably Effective Face Morphs
Zander Blasingame, Chen Liu
(2024), pp. 1-11
Open Access | Times Cited: 1
Zander Blasingame, Chen Liu
(2024), pp. 1-11
Open Access | Times Cited: 1
OrthoMAD: Morphing Attack Detection Through Orthogonal Identity Disentanglement
Pedro C. Neto, Tiago Gonçalves, Marco Huber, et al.
(2022)
Open Access | Times Cited: 5
Pedro C. Neto, Tiago Gonçalves, Marco Huber, et al.
(2022)
Open Access | Times Cited: 5
SynFacePAD 2023: Competition on Face Presentation Attack Detection Based on Privacy-aware Synthetic Training Data
Meiling Fang, Marco Huber, Julián Fiérrez, et al.
(2023), pp. 1-11
Open Access | Times Cited: 2
Meiling Fang, Marco Huber, Julián Fiérrez, et al.
(2023), pp. 1-11
Open Access | Times Cited: 2
Hierarchical Generative Network for Face Morphing Attacks
Zuyuan He, Zongyong Deng, Qiaoyun He, et al.
(2024), pp. 1-9
Open Access
Zuyuan He, Zongyong Deng, Qiaoyun He, et al.
(2024), pp. 1-9
Open Access
Feature Interaction-Based Face De-Morphing Factor Prediction for Restoring Accomplice’s Facial Image
Juan‐Juan Cai, Qiangqiang Duan, Min Long, et al.
Sensors (2024) Vol. 24, Iss. 17, pp. 5504-5504
Open Access
Juan‐Juan Cai, Qiangqiang Duan, Min Long, et al.
Sensors (2024) Vol. 24, Iss. 17, pp. 5504-5504
Open Access
Face Morphing via Adversarial Attack-based Adaptive Blending
Qiaoyun He, Deng Zongyong, Zuyuan He, et al.
2022 International Joint Conference on Neural Networks (IJCNN) (2024) Vol. P-296, pp. 1-8
Closed Access
Qiaoyun He, Deng Zongyong, Zuyuan He, et al.
2022 International Joint Conference on Neural Networks (IJCNN) (2024) Vol. P-296, pp. 1-8
Closed Access
W-TDL: Window-Based Temporal Deepfake Localization
Luka Dragar, Peter Rot, Peter Peer, et al.
(2024), pp. 24-29
Closed Access
Luka Dragar, Peter Rot, Peter Peer, et al.
(2024), pp. 24-29
Closed Access
Towards Federated Learning for Morphing Attack Detection
Marta Robledo-Moreno, Guido Borghi, Nicolò Di Domenico, et al.
(2024), pp. 1-10
Closed Access
Marta Robledo-Moreno, Guido Borghi, Nicolò Di Domenico, et al.
(2024), pp. 1-10
Closed Access
DFS-Net: StyleGAN2-based dual feature separation for face De-Morphing
Ming Long, Song Chen, Le‐Bing Zhang, et al.
Multimedia Tools and Applications (2024)
Closed Access
Ming Long, Song Chen, Le‐Bing Zhang, et al.
Multimedia Tools and Applications (2024)
Closed Access
ADFF: Adaptive de‐morphing factor framework for restoring accomplice's facial image
Min Long, Jun Zhou, Le‐Bing Zhang, et al.
IET Image Processing (2023) Vol. 18, Iss. 2, pp. 470-480
Open Access | Times Cited: 1
Min Long, Jun Zhou, Le‐Bing Zhang, et al.
IET Image Processing (2023) Vol. 18, Iss. 2, pp. 470-480
Open Access | Times Cited: 1
Depth-guided Robust Face Morphing Attack Detection
Harsh Rachalwar, Meiling Fang, Naser Damer, et al.
(2023), pp. 1-9
Closed Access | Times Cited: 1
Harsh Rachalwar, Meiling Fang, Naser Damer, et al.
(2023), pp. 1-9
Closed Access | Times Cited: 1
Impact of Synthetic Images on Morphing Attack Detection Using a Siamese Network
Juan Tapia, Christoph Busch
Lecture notes in computer science (2023), pp. 343-357
Closed Access | Times Cited: 1
Juan Tapia, Christoph Busch
Lecture notes in computer science (2023), pp. 343-357
Closed Access | Times Cited: 1
Exploring the Design Space of Diffusion Autoencoders for Face Morphing
Zander Blasingame, Chen Liu
arXiv (Cornell University) (2023)
Open Access
Zander Blasingame, Chen Liu
arXiv (Cornell University) (2023)
Open Access
Unveiling the Two-Faced Truth: Disentangling Morphed Identities for Face Morphing Detection
Eduarda Caldeira, Pedro C. Neto, Tiago Gonçalves, et al.
(2023), pp. 955-959
Open Access
Eduarda Caldeira, Pedro C. Neto, Tiago Gonçalves, et al.
(2023), pp. 955-959
Open Access
AlphaNet: Single Morphing Attack Detection Using Multiple Contributors
Juan Tapia, Christoph Busch
(2023), pp. 1-6
Closed Access
Juan Tapia, Christoph Busch
(2023), pp. 1-6
Closed Access