
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Binary watermarks: a practical method to address face recognition replay attacks on consumer mobile devices
Daniel F. Smith, Arnold Wiliem, Brian C. Lovell
(2015) Vol. 1, pp. 1-6
Closed Access | Times Cited: 5
Daniel F. Smith, Arnold Wiliem, Brian C. Lovell
(2015) Vol. 1, pp. 1-6
Closed Access | Times Cited: 5
Showing 5 citing articles:
Continuous User Authentication on Mobile Devices: Recent progress and remaining challenges
Vishal M. Patel, Rama Chellappa, Deepak Chandra, et al.
IEEE Signal Processing Magazine (2016) Vol. 33, Iss. 4, pp. 49-61
Closed Access | Times Cited: 310
Vishal M. Patel, Rama Chellappa, Deepak Chandra, et al.
IEEE Signal Processing Magazine (2016) Vol. 33, Iss. 4, pp. 49-61
Closed Access | Times Cited: 310
An efficient face anti-spoofing and detection model using image quality assessment parameters
Aditya Bakshi, Sunanda Gupta
Multimedia Tools and Applications (2020) Vol. 81, Iss. 24, pp. 35047-35068
Closed Access | Times Cited: 9
Aditya Bakshi, Sunanda Gupta
Multimedia Tools and Applications (2020) Vol. 81, Iss. 24, pp. 35047-35068
Closed Access | Times Cited: 9
A lite convolutional neural network built on permuted Xceptio-inception and Xceptio-reduction modules for texture based facial liveness recognition
Ashutosh Satapathy, L.M. Jenila Livingston
Multimedia Tools and Applications (2020) Vol. 80, Iss. 7, pp. 10441-10472
Closed Access | Times Cited: 9
Ashutosh Satapathy, L.M. Jenila Livingston
Multimedia Tools and Applications (2020) Vol. 80, Iss. 7, pp. 10441-10472
Closed Access | Times Cited: 9
Who Is Using the Phone? Representation-Learning-Based Continuous Authentication on Smartphones
Huanran Wang, Hui He, Chen Song, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 5
Huanran Wang, Hui He, Chen Song, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 5
The Study on Using Biometric Authentication on Mobile Device
Onsiri Silasai, Wachana Khowfa
Warasan Witthayasat Mahawitthayalai Naresuan (2020) Vol. 17, Iss. 1, pp. 90-110
Closed Access | Times Cited: 6
Onsiri Silasai, Wachana Khowfa
Warasan Witthayasat Mahawitthayalai Naresuan (2020) Vol. 17, Iss. 1, pp. 90-110
Closed Access | Times Cited: 6