
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Spoofing faces using makeup: An investigative study
Cunjian Chen, Antitza Dantcheva, Thomas Swearingen, et al.
(2017), pp. 1-8
Open Access | Times Cited: 68
Cunjian Chen, Antitza Dantcheva, Thomas Swearingen, et al.
(2017), pp. 1-8
Open Access | Times Cited: 68
Showing 1-25 of 68 citing articles:
A survey on deep learning based face recognition
Guodong Guo, Na Zhang
Computer Vision and Image Understanding (2019) Vol. 189, pp. 102805-102805
Closed Access | Times Cited: 426
Guodong Guo, Na Zhang
Computer Vision and Image Understanding (2019) Vol. 189, pp. 102805-102805
Closed Access | Times Cited: 426
Presentation Attack Detection Methods for Face Recognition Systems
Raghavendra Ramachandra, Christoph Busch
ACM Computing Surveys (2017) Vol. 50, Iss. 1, pp. 1-37
Closed Access | Times Cited: 292
Raghavendra Ramachandra, Christoph Busch
ACM Computing Surveys (2017) Vol. 50, Iss. 1, pp. 1-37
Closed Access | Times Cited: 292
BeautyGAN
Tingting Li, Ruihe Qian, Chao Dong, et al.
Proceedings of the 30th ACM International Conference on Multimedia (2018)
Closed Access | Times Cited: 211
Tingting Li, Ruihe Qian, Chao Dong, et al.
Proceedings of the 30th ACM International Conference on Multimedia (2018)
Closed Access | Times Cited: 211
Deep Models and Shortwave Infrared Information to Detect Face Presentation Attacks
Guillaume Heusch, Anjith George, David Geissbühler, et al.
IEEE Transactions on Biometrics Behavior and Identity Science (2020) Vol. 2, Iss. 4, pp. 399-409
Open Access | Times Cited: 87
Guillaume Heusch, Anjith George, David Geissbühler, et al.
IEEE Transactions on Biometrics Behavior and Identity Science (2020) Vol. 2, Iss. 4, pp. 399-409
Open Access | Times Cited: 87
A Multi-task Convolutional Neural Network for Joint Iris Detection and Presentation Attack Detection
Cunjian Chen, Arun Ross
(2018), pp. 44-51
Closed Access | Times Cited: 72
Cunjian Chen, Arun Ross
(2018), pp. 44-51
Closed Access | Times Cited: 72
Impact and Detection of Facial Beautification in Face Recognition: An Overview
Christian Rathgeb, Antitza Dantcheva, Christoph Busch
IEEE Access (2019) Vol. 7, pp. 152667-152678
Open Access | Times Cited: 70
Christian Rathgeb, Antitza Dantcheva, Christoph Busch
IEEE Access (2019) Vol. 7, pp. 152667-152678
Open Access | Times Cited: 70
3D Face Anti-Spoofing With Factorized Bilinear Coding
Shan Jia, Xin Li, Chuanbo Hu, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2020) Vol. 31, Iss. 10, pp. 4031-4045
Open Access | Times Cited: 58
Shan Jia, Xin Li, Chuanbo Hu, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2020) Vol. 31, Iss. 10, pp. 4031-4045
Open Access | Times Cited: 58
Lipstick ain’t enough: Beyond Color Matching for In-the-Wild Makeup Transfer
Thao Nguyen, Anh Tran, Minh Hoai
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2021)
Open Access | Times Cited: 51
Thao Nguyen, Anh Tran, Minh Hoai
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2021)
Open Access | Times Cited: 51
Mask does not matter
Weiye Xu, Wenfan Song, Jianwei Liu, et al.
Proceedings of the 28th Annual International Conference on Mobile Computing And Networking (2022), pp. 310-323
Closed Access | Times Cited: 31
Weiye Xu, Wenfan Song, Jianwei Liu, et al.
Proceedings of the 28th Annual International Conference on Mobile Computing And Networking (2022), pp. 310-323
Closed Access | Times Cited: 31
An automated and efficient convolutional architecture for disguise-invariant face recognition using noise-based data augmentation and deep transfer learning
Muhammad Junaid Khan, Muhammad Jaleed Khan, Adil Masood Siddiqui, et al.
The Visual Computer (2021) Vol. 38, Iss. 2, pp. 509-523
Closed Access | Times Cited: 39
Muhammad Junaid Khan, Muhammad Jaleed Khan, Adil Masood Siddiqui, et al.
The Visual Computer (2021) Vol. 38, Iss. 2, pp. 509-523
Closed Access | Times Cited: 39
A review of state-of-the-art in Face Presentation Attack Detection: From early development to advanced deep learning and multi-modal fusion methods
Faseela Abdullakutty, Eyad Elyan, Pamela Johnston
Information Fusion (2021) Vol. 75, pp. 55-69
Open Access | Times Cited: 36
Faseela Abdullakutty, Eyad Elyan, Pamela Johnston
Information Fusion (2021) Vol. 75, pp. 55-69
Open Access | Times Cited: 36
Face liveness detection: fusing colour texture feature and deep feature
F Chen, Chang Wen, Kai Xie, et al.
IET Biometrics (2019) Vol. 8, Iss. 6, pp. 369-377
Open Access | Times Cited: 41
F Chen, Chang Wen, Kai Xie, et al.
IET Biometrics (2019) Vol. 8, Iss. 6, pp. 369-377
Open Access | Times Cited: 41
Introduction to Presentation Attack Detection in Face Biometrics and Recent Advances
Javier Hernandez‐Ortega, Julián Fiérrez, Aythami Morales, et al.
Advances in computer vision and pattern recognition (2023), pp. 203-230
Closed Access | Times Cited: 12
Javier Hernandez‐Ortega, Julián Fiérrez, Aythami Morales, et al.
Advances in computer vision and pattern recognition (2023), pp. 203-230
Closed Access | Times Cited: 12
Detection of Age-Induced Makeup Attacks on Face Recognition Systems Using Multi-Layer Deep Features
Ketan Kotwal, Zohreh Mostaani, Sébastien Marcel
IEEE Transactions on Biometrics Behavior and Identity Science (2019) Vol. 2, Iss. 1, pp. 15-25
Open Access | Times Cited: 29
Ketan Kotwal, Zohreh Mostaani, Sébastien Marcel
IEEE Transactions on Biometrics Behavior and Identity Science (2019) Vol. 2, Iss. 1, pp. 15-25
Open Access | Times Cited: 29
Makeup Presentation Attacks: Review and Detection Performance Benchmark
Christian Rathgeb, Pawel Drozdowski, Christoph Busch
IEEE Access (2020) Vol. 8, pp. 224958-224973
Open Access | Times Cited: 23
Christian Rathgeb, Pawel Drozdowski, Christoph Busch
IEEE Access (2020) Vol. 8, pp. 224958-224973
Open Access | Times Cited: 23
High Intrinsic Dimensionality Facilitates Adversarial Attack: Theoretical Evidence
Laurent Amsaleg, James Bailey, Amélie Barbe, et al.
IEEE Transactions on Information Forensics and Security (2020) Vol. 16, pp. 854-865
Open Access | Times Cited: 21
Laurent Amsaleg, James Bailey, Amélie Barbe, et al.
IEEE Transactions on Information Forensics and Security (2020) Vol. 16, pp. 854-865
Open Access | Times Cited: 21
Detection of Makeup Presentation Attacks based on Deep Face Representations
Christian Rathgeb, Pawel Drozdowski, Christoph Busch
2022 26th International Conference on Pattern Recognition (ICPR) (2021)
Open Access | Times Cited: 19
Christian Rathgeb, Pawel Drozdowski, Christoph Busch
2022 26th International Conference on Pattern Recognition (ICPR) (2021)
Open Access | Times Cited: 19
On the vulnerability of ECG verification to online presentation attacks
Nima Karimian, Damon L. Woodard, Domenic Forte
(2017), pp. 143-151
Closed Access | Times Cited: 23
Nima Karimian, Damon L. Woodard, Domenic Forte
(2017), pp. 143-151
Closed Access | Times Cited: 23
CCoLBP: Chromatic Co-Occurrence of Local Binary Pattern for Face Presentation Attack Detection
Fei Peng, Le Qin, Min Long
(2018), pp. 1-9
Closed Access | Times Cited: 22
Fei Peng, Le Qin, Min Long
(2018), pp. 1-9
Closed Access | Times Cited: 22
Entropy-Based Face Recognition and Spoof Detection for Security Applications
Francisco A. Pujol, M.J. Pujol, Carlos Rizo-Maestre, et al.
Sustainability (2019) Vol. 12, Iss. 1, pp. 85-85
Open Access | Times Cited: 20
Francisco A. Pujol, M.J. Pujol, Carlos Rizo-Maestre, et al.
Sustainability (2019) Vol. 12, Iss. 1, pp. 85-85
Open Access | Times Cited: 20
Real-World Adversarial Examples Via Makeup
Chang-Sheng Lin, Chia-Yi Hsu, Pin‐Yu Chen, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2022)
Closed Access | Times Cited: 10
Chang-Sheng Lin, Chia-Yi Hsu, Pin‐Yu Chen, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2022)
Closed Access | Times Cited: 10
Attacking Face Recognition With T-Shirts: Database, Vulnerability Assessment, and Detection
Mathias Ibsen, Christian Rathgeb, Fabian Brechtel, et al.
IEEE Access (2023) Vol. 11, pp. 57867-57879
Open Access | Times Cited: 5
Mathias Ibsen, Christian Rathgeb, Fabian Brechtel, et al.
IEEE Access (2023) Vol. 11, pp. 57867-57879
Open Access | Times Cited: 5
Dynamic facial presentation attack detection for automated border control systems
David Ortega-delCampo, Alberto Fernández-Isabel, Isaac Martín de Diego, et al.
Computers & Security (2020) Vol. 92, pp. 101744-101744
Open Access | Times Cited: 14
David Ortega-delCampo, Alberto Fernández-Isabel, Isaac Martín de Diego, et al.
Computers & Security (2020) Vol. 92, pp. 101744-101744
Open Access | Times Cited: 14
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study
Le Qin, Fei Peng, Min Long, et al.
ACM Transactions on Privacy and Security (2021) Vol. 25, Iss. 1, pp. 1-28
Open Access | Times Cited: 11
Le Qin, Fei Peng, Min Long, et al.
ACM Transactions on Privacy and Security (2021) Vol. 25, Iss. 1, pp. 1-28
Open Access | Times Cited: 11
Vulnerability Assessment and Detection of Makeup Presentation Attacks
Christian Rathgeb, Pawel Drozdowski, Daniel Fischer, et al.
(2020), pp. 1-6
Closed Access | Times Cited: 11
Christian Rathgeb, Pawel Drozdowski, Daniel Fischer, et al.
(2020), pp. 1-6
Closed Access | Times Cited: 11